Ingram Micro | PracticeBuilder for IT Security
Transcription
Ingram Micro | PracticeBuilder for IT Security
Ingram Micro | PracticeBuilder for IT Security NEW OPPORTUNITIES IN A CHANGING MARKET Inside you’ll learn how to: Q Grow your IT Security practice Q Outsell the competition while increasing profits Q Ask the questions others don’t Q Leverage Ingram Micro resources for fast results Advanced Technology Security Solutions Page 1 Content © 2005-2011 OCE Inc, All rights reserved. Licensed to Ingram Micro, Inc., 2011. Published for Ingram Micro by: Outsource Channel Executives, Inc. 3313 W Kiowa St. Colorado Springs, CO 80904, USA www.OCEinc.com Printed in the USA V5.0 Disclaimer Neither the author nor the publisher assumes any responsibility for errors, inaccuracies, or omissions. Any slights of people or organizations are unintentional. This publication is not intended for use as a source of security, technical, legal, accounting, financial, or other professional advice. If advice concerning these matters is needed, seek the services of a qualified professional as this information is not a substitute for professional counsel. Neither the author nor the publisher accepts any responsibility or liability for your use of the ideas presented herein. Some suggestions made in this document concerning business practices may have inadvertently introduced practices deemed unlawful in certain states, municipalities, or countries. You should be aware of the various laws governing your business practices in your particular industry and in your location. While the websites referenced were personally reviewed by the author, there are no guarantees to their safety. Practice safe Internet surfing with current antivirus software and a browser with active security settings. PracticeBuilder is a trademark of Outsource Channel Executives, Inc., licensed to Ingram Micro. All rights reserved. All trademarks and registered trademarks are the property of their respective holders. Ingram Micro logos are trademarks used under license by Ingram Micro, Inc. Products available while supplies last. Prices subject to change without notice. Author: Mark S.A. Smith, OCE, Inc. Subject Matter Expert: Chris Squier, Ingram Micro, Inc. OCE Project Manager: Debbie AlBayati Project Manager: Dorothy Martinez, Erin McNiff, Ingram Micro, Inc. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 2 Ingram Micro PracticeBuilder © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 3 Table of Contents Overview................................................................................................................. 7 What’s in this PracticeBuilder? .......................................................................... 7 What is Security? .................................................................................................... 9 Security Goes Beyond IT.................................................................................. 10 Why Security? .................................................................................................. 10 The State of Security ........................................................................................ 11 Why the Investment in Security Solutions Pays ............................................... 13 Compliance Demands ....................................................................................... 13 Increased Need for Services ............................................................................. 16 Web Threats Proliferate .................................................................................... 16 Mobile Device Protection ................................................................................. 17 Information Lifecycle Management ................................................................. 18 The Lines of Network and Security Get Blurry................................................ 18 Network Security .............................................................................................. 19 Private Networks .............................................................................................. 19 Firewalls ........................................................................................................... 20 Endpoint Security ............................................................................................. 22 Intrusion Detection and Prevention Systems .................................................... 22 Physical Security .............................................................................................. 23 Controlling Network Access............................................................................. 23 The Future of Security ...................................................................................... 23 How to Build a Security Solutions Practice.......................................................... 25 Becoming the Security Brand ........................................................................... 25 A Logical Business Expansion Opportunity..................................................... 25 Investment Requirements ................................................................................. 25 Value to You ..................................................................................................... 27 Begin with the Security Policy ......................................................................... 27 Start Discussion at the Top ............................................................................... 28 Overcoming Potential Concerns ....................................................................... 29 Selling Security ................................................................................................. 30 Policy Review ................................................................................................... 31 Target Client Profile ............................................................................................. 33 Value to Your Client ......................................................................................... 35 Up-sell and Cross-sell Opportunities .................................................................... 37 Adjacent Technologies Help You Complete the Solution ................................ 38 Executive Questions ............................................................................................. 41 CEO, Sales VP, Marketing VP ......................................................................... 41 CFO................................................................................................................... 42 IT, CIO .............................................................................................................. 43 Detailed Questions ............................................................................................ 43 Creating a Business Case for Security Solutions .................................................. 45 Calculating Solution Costs ............................................................................... 45 Calculating ROI Benefits .................................................................................. 46 The Value of Security ....................................................................................... 47 © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 4 Ingram Micro PracticeBuilder How to Generate a Winning Proposal .................................................................. 49 How to Properly Use a Report of Findings ...................................................... 49 Report of Findings and Action Plan Template ..................................................... 51 Glossary ................................................................................................................ 55 Security Opportunity Profile ................................................................................. 57 Security Project Planning Checklist ..................................................................... 63 Security Installation Checklist .............................................................................. 69 Your Action Plan .................................................................................................. 73 30-day Plan ....................................................................................................... 73 60-day Plan ....................................................................................................... 74 90-day Plan ....................................................................................................... 75 Action Ideas that Will Make Me Money .............................................................. 77 Ingram Micro Services.......................................................................................... 79 Ingram Micro Solution Centers ........................................................................ 79 Agency Express ................................................................................................ 79 Technology Solutions Engineer ........................................................................ 79 CAP—Customer Advantage Program .............................................................. 79 Partner Connections Summit ............................................................................ 80 Technology Bootcamps and Roadshow Seminars ............................................ 80 Ingram Micro Services Network (IMSN) ......................................................... 80 Manufacturer SKU’d Services .......................................................................... 80 E-commerce Partner Referral ........................................................................... 80 Ingram Micro Services Division (SPEX) ......................................................... 81 Technical Support Services .............................................................................. 81 Ingram Micro Contacts and Resources ................................................................. 83 The Security Team ............................................................................................ 83 Other Useful Contact Information .................................................................... 83 Premier Sponsors .................................................................................................. 87 Cisco ................................................................................................................. 87 Symantec........................................................................................................... 88 Additional Sponsors.............................................................................................. 89 Fortinet .............................................................................................................. 89 Juniper Networks .............................................................................................. 89 McAfee ............................................................................................................. 90 Sonicwall .......................................................................................................... 90 WatchGuard ...................................................................................................... 91 RSA................................................................................................................... 91 Trend Micro ...................................................................................................... 91 © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 5 Security Solutions PracticeBuilder™ © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 6 Ingram Micro PracticeBuilder © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 7 Overview You have in your hands a powerful toolkit designed to help you successfully make security solutions sales, fast. Review these tools before making your sales calls to plan how you’ll approach your prospective clients.1 This document is one of a series of PracticeBuilder Guides from Ingram Micro that can help you rapidly increase your profits and give you a competitive edge. Ask your sales rep for details about other toolkits. Pull out the “Action Ideas that Will Make Me Money” sheet on page 77. Use this page to jot down ideas as you read through this document. These are the ideas that will allow you to rapidly implement a profitable security solutions practice. What’s in this PracticeBuilder? In this kit you’ll find opportunity assessments, project planning guides, project installation guides, business case tools, questions that lead to the sale, reference materials, and sample proposals. In this document we will define security solutions—what they are and what they do. We will discuss why your clients will be interested in security solutions, the market, and the market drivers. We will discuss who to talk with and what to say. You’ll learn what a solution looks like and the steps to take to build a successful Security Solutions practice. Skim through this document to get a feeling for what is most interesting to you. It’s designed to be consumed cafeteria-style. Pick and choose what tempts you. You can even start with dessert if you want. As you develop your Security solutions practice, refer back to this document to identify ways to improve your business or to troubleshoot areas where your business isn’t going as well as you think it could. And, of course, call your Ingram Micro technical support team for help at any time, on any product, in any client situation especially for any security-related question, training, or solution. We have lots of experience; we can help. You’ll find contact information on page 83. 1 In this toolkit the word client refers to the company that you are selling to (after all, you’re a consultant, and consultants service clients), and customer refers to who your client sells to. This keeps the parties clear in the discussion. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 8 Ingram Micro PracticeBuilder © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 9 What is Security? In general, a security policy addresses the confidentiality, integrity, availability, and accountability of electronic information processed by, stored on, or moved between computer systems. Security is the protection of information assets through the use of technology, processes, and training. Security encompasses everything from physical security to HR policies to access control and more. Security includes a number of technologies and solutions that have grown out of data sharing across computer networks. Other names for these solutions include endpoint protection, data loss prevention, content filtering, unified threat management, intellectual property protection, compliance, business continuity, and a variety of terms that cover everything from software that targets specific threats to broad suites of applications. Security is all about protecting critical data, the people we depend on, and the survivability/resilience of the organization. Security consists of: Risk management/GAP Analysis Identifying threats to the ongoing visibility/sustainability of the business (legal, electronic, physical, other threats): Policy development and compliance Threat and early warning systems Intrusion protection Business Continuity and disaster recovery Tracking the flow of assets and intellectual property throughout an organization, and being able to control and audit against it Security starts with deciding what your client wants to protect and then deciding how much they want to protect it. You don’t want to protect everything; it’s too © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 10 Ingram Micro PracticeBuilder expensive and can be a little annoying. However, annoyance is of little concern when faced with a lawsuit. Levels of security controls will be dependent on criticality. Key assets are: People—employees, customers, key vendors, and stakeholders Property –physical, electronic, and intellectual Processes—procedures used to successfully conduct business Proprietary data—trade secrets, confidential information, and personal data. Legal—protection from legal/regulatory action Corporate security is about protecting the ability to conduct business, preserving valuable or critical assets that determine the well-being of the organization. The alternative is expensive because corporate data breach average cost has hit $7.2 million.2 Security Goes Beyond IT A Deloitte report says that for 62 percent of their survey respondents the security budget is still wrapped in the IT budget, and 35 percent say that one of the biggest obstacles they face in implementing successful security technology and policy is lack of owner or executive support. Yet an ever increasing portion of the security budget comes from finance, audit, and legal departments. Security is more than just a technology solution. This means you’re going to grow your business outside of the IT department. Why Security? Aside from shutting down the network and burying the servers in a concrete box, security solutions are one of the best ways for your clients to protect their data and tangible assets. 2 http://www.networkworld.com/news/2011/030811-ponemon-data-breach.html © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 11 The cost impacts of a security breach are high, often resulting in lost revenue, compromised client data, and theft of intellectual property. A company’s success depends on: Relationships Reputation Results A shift in philosophy drives choosing security, based on the need to protect valuable assets and information. Clients don’t want to lose business or negatively affect employee productivity due to a security breach. Your clients want to: Minimize system downtime caused by a security related incident Avoid liability suits caused by information breaches or the inability to deliver products and services as promised Reduce the risk of information leaks through insider threats, organized computer crime, spyware, spam, and online scams like phishing Prevent unauthorized information and network access, by both internal and external sources Maintain data privacy standards, some of which are mandated by law (such as employee personal data, medical records, company financial information, and customer records) Protect information transferred via the web or email, especially financial information like credit card numbers and personally identifiable information (PII) Receive proactive notification of system weaknesses and possible threats Protect physical assets, employees, and customers The State of Security In fact the most recent Computer Security Institute survey found “respondents did not seem to feel that their challenges were attributable to a lack of investment in their security programs or dissatisfaction with security tools, but rather that, despite all their efforts, they still could not be certain about what was really going © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 12 Ingram Micro PracticeBuilder on in their environments, nor whether all their efforts were truly effective.”3 You may wish to download a copy of this report for your files. The 2010-2011 Computer Security Institute survey reports these facts about the state of security:4 • Malware infection continued to be the most commonly seen attack, with 67.1 percent of respondents reporting it • Respondents reported markedly fewer financial fraud incidents than in previous years, with only 8.7 percent saying they’d seen this type of incident during the covered period • Of the approximately half of respondents who experienced at least one security incident last year, fully 45.6 percent of them reported they’d been the subject of at least one targeted attack • Respondents said that regulatory compliance efforts have had a positive effect on their security programs • By and large, respondents did not believe that the activities of malicious insiders accounted for much of their losses due to cybercrime. 59.1 percent believe that no such losses were due to malicious insiders. Only 39.5 percent could say that none of their losses were due to non-malicious insider actions In 2010, 95,000 unique pieces of malware in total appeared, doubling the volume of malware seen in 2009.5 New malware appears, on average, once every 0.9 seconds. You client can’t keep up with all of the changes without your help. What this means is that how we approach delivering security to our clients changes as the nature of the attacks change. Even a savvy IT administrator can’t keep up with all of the threats, security strategies, and mitigation methodologies along with all the other things they need to know about traditional IT infrastructure. Your customers need you! 3 http://analytics.informationweek.com/abstract/21/7377/Security/research-2010-2011-csisurvey.html 4 ibid 5 http://www.sophos.com/en-us/security-news-trends/security-trends/security-threat-report2011.aspx © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 13 Why the Investment in Security Solutions Pays The most compelling reason to invest in security solutions is to protect existing business. Customer retention costs about one-tenth as much as acquiring a new customer. It used to be that an angry customer would tell an average of seven people about their bad experience. Now an angry customer with a blog, Facebook, and Twitter account will tell thousands of people. For example, if new customer acquisition costs $200 dollars, you can estimate that customer retention is costing around $20 dollars. Your clients make money on repeat customers. A satisfying customer experience—which includes confidence that the business is able to protect sensitive data and provide a consistent level of service––creates the foundation for customer loyalty. In addition, the costs of lost customer data and the potential legal action that result from some kinds of security breaches carry a high cost of their own. Having sound security practices that can be audited against ISO/IEC standards can help attract business in several vertical markets such as healthcare and government, since these folks need to comply as well.6 The U.S. Government is beginning to bolster ties with private industry for security services given potential vulnerabilities to critical U.S. infrastructure, like power grids and financial markets. Compliance Demands Most businesses are affected by regulatory compliance obligations. Some organizations are subject to specific industry regulations, such as HIPAA or PCI, while every publicly traded company must meet Sarbanes-Oxley (SOX) and other general regulations. Although there are over 10,000 different regulations that may affect your client, they all deal with protecting the security of your client’s data. A quick Internet search will lead you to the latest information about these regulations. From a compliance perspective, 2011 will be an interesting year as more regulations and mandates take effect. Companies in many industries will be working to comply with legal and regulatory mandates that protect private, sensitive information. Compliance is driving security spending, the top driver in fact in more than 60 percent of organizations benchmarked. Compliance (audit results) is also used as 6 Learn more and link to downloadable standards at http://en.wikipedia.org/wiki/ISO/IEC_27002 © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 14 Ingram Micro PracticeBuilder the primary metric of success in more than 64 percent of organizations benchmarked. Keeping up-to-date with CFRs (Code of Federal Regulations), ISOs (Specifications for Information Security Management Systems), and PCI DSSs is a helpful step in ensuring your security practice is the “go-to” preferred provider. For example, HITECH, which updates HIPAA (Health Insurance Portability and Accountability Act) not only adds breached access notifications, but also extends coverage to a much broader range of organizations including web-based electronic health records management systems such as Google Health. Keeping up with the Certs and Specs Another major challenge, particularly for small- and medium-sized companies is the need to stay current on directives, mandates, law changes, education, training, and certification. Here’s where you can really help. In an increasingly digitized world, smaller businesses are compelled to implement technology with little or no internal IT support; keeping systems safe, efficient, and effective proves to be a challenge. Toss in the general trends moving businesses toward VoIP, grid computing, and virtualization, and you find clients throwing up their hands in frustration. On the bright side, this is opening new opportunities for service providers to offer security consulting and services, including managed services to their clients. Opportunity abounds. Access Control Compliance Demands Access control, or projects that include access control, can be challenging. Successful implementation involves the deployment of physical technologies and the configuration and management of rules and policies. The resulting system must meet the compliance regulation requirements affecting your client’s business. It’s not compliance regulations that affect the selection and deployment of access control technologies, or the configuration or management of the resulting system. Instead, it’s the end result of the access control project that must stand up to compliance scrutiny. For instance, a regulation may require the inclusion of access controls and delineate the objectives of that resource, but will not specify particular products or configurations. Solution providers are free to accommodate the unique circumstances of each client—as long as the resulting access control system meets the goals of each compliance regulation. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 15 Solution providers engaged in access control must know and understand the needs of each regulation as well as the needs of the client. Providers must also be able to resolve potential conflicts between overlapping regulations, often defaulting to the “lowest common denominator” between regulations. For example, if a client is affected by three major regulations, each with different auditing periods, the provider may select the most frequent auditing period in order to satisfy all of the regulations. If your security solution involves access control, you’ll need to know compliance law and the potential penalties your clients face. Many providers employ a lawyer to clarify compliance liabilities. Knowledgeable legal counsel benefits both the provider and the client. Protecting your client and protecting yourself don’t have to be mutually exclusive. Many providers choose to work with companies that specialize in compliance, auditing, and the legal aspects of corporate governance. Governance, risk, and compliance (GRC) tools help map internal business controls and processes to regulatory requirements, allowing providers (and their clients) to identify anomalies that can be addressed before they become a problem or costly liability. And remember: the Ingram Micro team is here to help you grow your Security Solutions practice in every way. We have the resources you need to get the job done, and get it done right. PCI Compliance Even though PCI-DSS isn’t a federal mandate, the potential concerns are higher because state and local governments are placing requirements on businesses that compel them to ensure their customers’ data is secure. The thought of a hotel that can’t accept credit cards starts IT professionals’ knees knocking. Federal mandate or no, businesses must respond. You may remember the lawsuit brought against retailer TJX (parent company of TJMaxx, Marshalls, and other retail outlets in the U.S and Canada) which cost them almost $1 billion dollars in fines and other expenses, not to mention the hit to market confidence and customer satisfaction. The breach started with hackers breaking into the network at two U.S. stores, but in a little over a year, 47.5 million records were stolen. Many companies have set aside additional budget dollars to address the need to protect customer’s credit card information. According to the latest Data Protection and Control survey by IDC, 72 percent of large companies and 49 percent of the mid-sized businesses that accept credit cards are planning implementations or upgrades in order to comply with standards or increase competitive advantage. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 16 Ingram Micro PracticeBuilder Increased Need for Services Organizations are finding that the frequency and sophistication of threats is out of control for them to handle internally and they’re looking for service providers with competency to be able to handle the constant threat. There is plenty of opportunity in your market to make profits and expand your practice. Companies are choosing managed security service providers (MSSPs) to do more than block spam and encrypt email messages. As concerns over budgets continue, companies turn to resellers and partners for managed services like monitoring clients’ security networks and compliance. Solution providers who are successful winning business in the mid- and enterprise business market are offering what their clients don’t have—specialized skills that help improve process and reduce cost. With compliance still at the forefront of challenges faced by security professionals, opportunities are growing in the area of audit preparation services and consulting, particularly reporting and workflow packages that automate the process. Web Threats Proliferate Problems caused by malware continue to pose major challenges. The effects of cybercrime are far reaching. It would be a difficult task to find someone who has never been affected by malicious Internet activity or who does not at the very least know someone who has been negatively impacted by cybercriminals. Advances in Internet technology and services continue to open up innumerable opportunities for learning, networking, and increasing productivity. However, malware authors, spammers, and phishers are also rapidly adopting new and varied attack vectors. If the Internet is to become a safer place, it is imperative to understand the trends and developments taking place in the Internet threat landscape and maintain online security best practices. Consider this: the probability of an attack from a random web page is about 1 in 3,0007 and between 80 and 90 percent of all e-mail is spam.8 7 http://security.cbronline.com/news/one-in-3000-websites-harbouring-malware-kaspersky240211 8 For the current spam levels, virus attacks, and phishing attempts, see http://www.messagelabs.com/globalthreats © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 17 Organized Crime Today, criminal motives are often the inspiration behind the act. After all, it’s way easier and safer to steal from someone thousands of miles away from you then to shake them down in person. A number of organized cybercriminal groups steal confidential data through crimeware or crimeware-as-a-service (CaaS anyone?). This is a class of malware designed specifically to automate cybercrime. Crimeware ‘kits’ are also now available for purchase via the Internet. A crimeware kit allows people to customize a piece of malicious code to steal data and other personal information. In 2009, Symantec observed nearly 90,000 unique variants of the basic Zeus crimeware toolkit, the second most common new malicious code family observed in the APJ. IT Systems and the Stuff Inside Data Loss Prevention (DLP, not to be confused with Digital Light Processing used in data projectors) continues to be another major trend in the security field. How to protect physical assets and the data—often confidential and frequently regulated—poses another major challenge for businesses large and small. In addition to HIPAA, SOX, and other government mandated compliance, expect new identity standards to target preventing data loss. Over 600,000 laptops are lost or stolen at US airports every year, posing threats of identity theft and causing millions of dollars in equipment loss.9 If you have a Windows-based device, don’t think your user password is going to offer much protection. If you want a real scare, look at Ophcrack. It claims to crack 99.9 percent of alphanumeric passwords of up to 14 characters in minutes.10 Managing access and remote disabling of portable devices is a real issue for all companies. Mobile Device Protection A potential threat is malware or crimeware attack on mobile platforms such as PDAs and cell phones. For many years security companies have been warning that malware will soon affect cell phones in much the same way it affects PCs. The saving grace for mobile devices is that they haven’t yet been a big enough target. With 90 percent of the world’s PCs running a Windows OS, new malware has a large potential victim pool. The cell phone environment is much more 9 10 Ponemon Institute http://en.wikipedia.org/wiki/Ophcrack © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 18 Ingram Micro PracticeBuilder heterogeneous, with numerous vendors using diverse hardware and various operating systems. With Apple keeping their mobile device system closed, any app offered has to be vetted and can only come from the Apple Applications Store. This means that the probability of a mass attack on the iPhone or iPad is low. Other open access devices aren’t as secure. For example, in early 2011, Google found 50 malware apps targeting the Android phone.11 It is very likely that cyber criminals will begin targeting mobile devices as more people use them and conduct financial transactions on them. A bigger threat is theft of a mobile device that isn’t password protected. This could be a real issue as more companies adopt mobile devices as a token device to access corporate computer systems—where the server calls the users cell phone to confirm access rights. Information Lifecycle Management With more privacy laws coming, effective Information Lifecycle Management (ILM) becomes critical to protect your client’s organization. If they are retaining data that is no longer required by law, it is a potential liability. For example, if damaging information is found during a legal discovery, it’s admissible even if the information is kept beyond the time required by statute. The ILM caveat: “They can’t discover or compromise what you don’t have on file.” Information Lifecycle Management applies procedures to effectively control information or data record throughout its applicable life, from inception to end. For example, for a financial institution; information can become a record by being documented as a transaction, withdrawal, deposit, etc. This type of data, though valuable for a period of time—even a requirement to save by the government in some cases—certainly has the potential to outlive its relevancy. The Lines of Network and Security Get Blurry The boundary separating networking and security is disappearing and might soon be eliminated. Network and security companies have been joining forces through 11 http://www.cio.com/article/671764/Android_Market_Spiked_with_Malware_Laced_Apps © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 19 a series of mergers and acquisitions to extend their market reach. The resulting products have the potential for richer and better integrated functionality that will benefit you and your clients. However, this means that network managers will need to know more about these next-generation products in order to evaluate, deploy, and maintain them effectively. While these emerging technologies offer businesses an exciting new level of protection, the integrated environment will also require a high level of collaboration in the IT department. Network and desktop systems managers, along with application managers, will have to collaborate across the IT organization. The growing awareness that security is more than just an IT problem means that line-of-business managers and corporate leaders will become more involved in these decisions and purchases. Along with traditional infrastructure concerns, impending changes to network design, challenges with mobile security, consolidation, and integration of security policies and procedures into the business, and growing VoIP and Virtualization offer excellent opportunities for growth in the Security and IPVS markets. Network Security Network Security is a prime focus of a security investment. Frankly, the only truly secure computer is one disconnected from the network, locked in a closet. If the computer is connected to the Internet, it’s at risk. Private Networks A private network uses internal wiring or costly leased phone lines to securely transmit data. A virtual private network (VPN) provides secure access to the company network through the Internet. A VPN provides virtually the same capability as a private network, without the expense. Unlike a private network, you can setup a VPN connection anywhere you can access the Internet. VPNs encrypt data before sending it through the network, securing it from attackers. If your client wants their people to access company confidential data through a wireless network or while traveling, they need a VPN or SSL12 Web access and should use SSL-based email servers. 12 Secure Sockets Layer (SSL) is a encrypted Web browsing protocol that describes how the data is passed through sockets between computers and applications (https://, instead of http://). © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 20 Ingram Micro PracticeBuilder Firewalls In the cyber world, a firewall13 is the interface between a local network and the wild, wild Internet. The firewall hides computer addresses from outsiders and blocks unexpected and unsanctioned traffic between the network and the Internet. Most network vendors offer a firewall solution. Hardware Firewalls a Must If you connect to the Internet you must have a hardware firewall or you will be compromised. Hardware firewalls can also guard against viruses, block spyware, and defend against some Denial of Service (DoS) attacks.14 Firewalls can be a stand-alone box or built into a network router or other network appliance.15 UTM Firewalls IT managers at small and midsize businesses like UTM appliances—firewalls that layer on antimalware protection, content filtering, antispam, and intrusion prevention—because deploying a single, multi-function device reduces costs and simplifies configuration. However, deciding whether and where to deploy UTM appliances in a large enterprise is a more complicated and difficult decision. The idea of a single point through which all traffic flows as an obvious locus for threat mitigation doesn't work when a network has dozens, hundreds, or thousands of distinct locations. Because performance is a critical issue in large networks, savvy network managers often seek to distribute threat protection rather than centralize it, simply to reduce the likelihood of a performance bottleneck. Similarly, the style and quality of threat mitigation features one commonly sees in an SMB UTM may not be of interest to an enterprise, where requirements are more exacting and security architectures are more complex. For example, the antispam features and functionality in UTM firewalls pale compared with those in stand-alone enterprise-class dedicated antispam/antivirus appliances. With such dramatic differences between SMB and enterprise requirements, is there a place for enterprise UTM firewalls? The answer is definitely yes, for these three reasons: reduced complexity, simplified management, and increased flexibility. Don’t hesitate to contact your Ingram Micro rep for help and advice A firewall in the physical world is a fireproof or fire-resistant wall that prevents the spread of fire through a building or a vehicle. 14 See glossary on page 55 15 An appliance is a computer-based tool designed to perform a specific function, usually for less cost or more securely than with a dedicated computer and software. 13 © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 21 when considering a UTM solution as part of your security solution offering to a client. Here are some basic pros and cons every solution provider should understand before deciding to offer a UTM appliance as part of their security solution: Pros Complexity: high availability and scalability are dramatically simplified in UTM appliances Management: a single management interface enables better coverage for less effort, and reduces the possibility of mistakes Flexibility: ability to bring security services in and out of the equation quickly supports threat response requirements best Cost: long-term costs for UTM will likely be lower than individual point solutions Cons Performance: enabling threat response features can cause a huge performance hit and make performance unpredictable depending on vendor architecture— many vendors can now keep up performance when all features are enabled Choice: bundled threat response represents choices the vendor made based on partnerships and commercial interests, not necessarily matching your client’s specific needs for their network Features: threat mitigation bundled into firewalls may differ depending on vendor. Separation: different teams are responsible for different threats, and requiring coordination and agreement between them can be difficult and timeconsuming Host-based and Software Firewalls Host-based and software firewalls should be a secondary line of defense. They are more vulnerable than a hardware firewall because they can be disabled by a user or by malware. Many attacks come through a browsed Web site, and by then it can be too late for a host-based firewall to act. Software firewalls work better to detect unexpected outbound traffic from a computer. Software firewalls can be highly secure gateway appliances if used properly. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 22 Ingram Micro PracticeBuilder Safer Internet Connection A proxy server is an intermediary computer between users’ computers and the Internet that controls and enforces security policy. It checks the user’s request against content filtering and access policy, forwards the request to the Internet hiding the user’s identity, and logs the activity. Like a firewall proxy servers prohibit unauthorized access from the Internet to the internal network. Proxy servers speed up Internet access by keeping copies of frequently accessed Web pages in a cache (a local memory) rapidly delivering the local copy when the page is requested. Safest Internet Connection A DMZ (demilitarized zone) is a computer or small network between a company’s private network and the Internet. The public can access the DMZ computer to get data or a Web page, for example, but can’t get to the private network. A DMZ is more secure than just a firewall and can act as a proxy server Endpoint Security Endpoint security is a centrally-managed security strategy using software installed on the devices (such as PCs, laptops, handhelds, scanners, and POS terminals) that attach to the network. On log-in, the host server validates the user and ensures that the device complies with security policies before granting network access. The program scans for unauthorized software and can administer patches. Unauthorized users and out-ofcompliance devices receive limited access or are quarantined. Endpoint security works well for securing a network that has access locations that can’t be physically secured. Intrusion Detection and Prevention Systems Network intrusion detection systems (IDS) observe network traffic for potential attackers. IDS can be performed with software or as a network appliance. If your client needs to protect valuable assets, consider using both methods because each is capable of detecting events that would be difficult or impossible for the other to identify. Typically, an intrusion triggers an operator alert to take action. An intrusion prevention system can take immediate action when an intrusion is detected, for example blocking specific network traffic upon detecting a © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 23 malicious action or limiting passage of unusual network activity until it can be analyzed. Physical Security Include a discussion with your client about physical security. An unguarded, isolated computer logged onto the network poses a security risk. A misplaced, unlocked mobile phone with passwords stored in a note offers the keys to the company. If the routers and switches are in an unlocked closet or freely accessible, the network is at risk--it’s easy to plug in an unauthorized laptop and compromise the system. Make sure that the hardware is under lock and key and that the keepers of the keys are trusted and accountable. Remember, the physical security of most datacenters is usually not controlled by IT. You’ll need to speak about this with others in your client organization, a perfect excuse to expand your contacts and influence. Controlling Network Access Network access control (NAC) is top of mind on the technology front. This includes, hardware, software, and services like: Network-integrated NAC enforcement devices such as switches, routers, and firewalls NAC enforcement appliances SSL VPNs (virtual private networks) using secure sockets layer (SSL) security protocols As a direct result of the trend toward a more mobile and geographically dispersed workforce, capital expenditures on equipment loss and theft for devices such as laptops, mobile phones, and PDAs continues to rise. The loss of this equipment, typically loaded with sensitive corporate data, naturally leads to increased interest and investment in security. These are not only technology issues; there are service issues and human factors swirled into the mix, providing opportunities to offer design, deployment, management, and training services as well. The Future of Security Products and services continue to evolve to meet the growing needs of the information security industry. The three major challenges your clients and their companies will face in the coming year will be access management, compliance, and protecting critical data. These challenges will focus on: © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 24 Ingram Micro PracticeBuilder Host-based or cloud security, including local laws where the data is physically hosted Mobile security concerns and solutions Encryption strategies Changing compliance mandates The spread of super-stealthy malware New botnets, smarter and bigger than ever Black market information trading and selling © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 25 How to Build a Security Solutions Practice Security offers opportunities to capture new business with a minor investment in additional skills. The budget for security solutions may come from the IT department and also from the business group responsible for securing the operation. This means you can expand your potential market beyond IT budgets. Becoming the Security Brand In order to generate profit and recurring revenue in today’s — and tomorrow’s — IT environment, you need to become your client’s preferred security brand. You’ll be delivering services under one name as one complete solution based on your client’s requirements. It won’t be a point solution or just a software sale. Instead, sell an on-going security service, like a utility, and you’ll better serve your clients and enjoy a stable business. The back-end that delivers all of this will be a combination of traditional security products (firewalls, anti-virus, data leak protection, etc.), cloud and managed services (disaster recovery, business continuity, data protection, etc.), and talent (assessments, threat analysis, policy creation and enforcement, education) to provide a complete security solution that adapts to changing conditions. A Logical Business Expansion Opportunity Security solutions incorporate many aspects of IT including computer and networking technologies, as well as software. But security goes way beyond the typical IT solution. Savvy solution providers offer security strategy consulting as part of their practice to help clients identify objectives and design an implementation plan, including software evaluation, security policy documentation, gap analysis, testing, enduser training, and deployment. This is where the profits lie in this market. You can use security solutions as a way to grow your practice by adding these additional services demanded by most of your clients. Investment Requirements There is an investment required to launch a security solutions practice in terms of sales and technical training. Ingram Micro can provide much of the training and © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 26 Ingram Micro PracticeBuilder guidance, while most vendor partners offer Not For Resale (NFR) demo software and equipment at no charge or for a small fee. Management You’ll need to develop a sense for security projects, perhaps using the tools included in this PracticeBuilder guide. You may also wish to attend Ingram Micro-sponsored training to get a handle on what’s required from your staff to deliver a complete and profitable solution. Technology For most business partners, very little additional technology is required to launch a security practice. It usually only requires developing an understanding of the available technologies, keeping up with market trends and, in some cases, certification. Otherwise, you’re probably already well versed in the components of a security solutions practice. Training and Certifications There are several industry-specific certifications, such as Certified Information Systems Security Professional (CISSP). Some vendors offer technical certifications for their specific products resulting in additional margins and partner benefits. Education and Awareness Guarding the physical safety of employees and customers, protecting business assets, and keeping intellectual property confidential is not a one-time event; it’s an ongoing process. Education and awareness programs offer an excellent opportunity to support your client’s efforts to maintain a safe and secure environment. Ingram Micro can help you to develop a variety of programs to meet your clients’ security education needs—everything from seminars to identify and document security strategies to in-depth programs that meet the DRII certification standards for security and business continuity. Refer to the information on page 83 for more details on whom to contact. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 27 Marketing You’ll want to mention your security solutions in your traditional marketing materials such as your website, email signature, business cards, inbound voicemail message, and Yellow Pages’ ad. You may want to host seminars and lunch-and-learn sessions at your client’s business site, distribute security technology updates via your newsletter, or develop giveaways with password tips printed on them (along with your contact information) to showcase your abilities. You may wish to include logos of vendor partners for which you hold certifications, enhancing your credibility in the marketplace. Ingram Micro offers marketing services and resources, including vendor funding for marketing activities. Find more information in the Ingram Micro Services section. Value to You Security is an IT project with funding from other departments Interest in security solutions continues to grow, you can be ready to meet your clients’ changing business needs Knowledge of this market helps you and your clients stay ahead of competitors Access to new clients Diversity that helps to grow your practice Protection for your client’s business and your relationship with them Ingram Micro can assist with technical configuration details and support to speed engagement acceptance and implementation Begin with the Security Policy A policy is a document that summarizes requirements that must be met and prioritizes expectations for specific areas of the company. It details what’s authorized, what’s unauthorized, when policies apply, and who is responsible for maintaining and enforcing the policies. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 28 Ingram Micro PracticeBuilder Without a policy, a company doesn’t know what to do or when to do what. The good news is that you can sell your products and services to implement the policy. Classic policy details scope, reasons, definitions, domains, roles and responsibilities, management, documentation, implementation, measurement, and updates and changes. A quick Web search of “sample security policies” turns up a number of for free and for fee examples. SANS offers sample security policies developed by a group of experienced professionals; a good starting point16 A relatively expensive but widely regarded book, Information Security Policies Made Easy includes electronic templates and fully-developed examples17 ISO/IEC standards are available for a nominal fee, NIST standards also widely used and available Deciding what to protect starts with a security policy. Most small and mid-size businesses don’t have a security policy and really need your help. If they do have a policy, the odds are well in your favor that it hasn’t been reviewed for several years and, so, is woefully out of date. As a solution provider, you’ll educate your client on the hardware, software, and support required to deliver a security solution. You can add value by helping them identify potential threats, document the existing network architecture, determine the future needs of their company, and lay out a plan to integrate the security technology needed to combat these threats. You may also provide implementation support, end-user training, or consulting services to help assess the current environment and develop the right levels of protection as well as the necessary security protocols. Start Discussion at the Top Bringing security solutions into your client’s organization means they’ll be embracing new operating methods. Implementing new strategies requires a discussion with the strategic thinkers in the company, not the tactical implementers. 16 17 http://www.sans.org/security-resources/policies/ www.informationshield.com © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 29 Strategic changes are always driven by a line-of-business manager. These executives understand that bringing on new technology will make their business more competitive and more profitable; they don’t mind training people or changing processes and procedures to make more money. So we recommend that you make your sales calls at the top level of the organization. Start with the people responsible for finance and corporate operations––the vice president of finance and the vice president of legal. You’ll be discussing issues that will be solved by implementing security solutions. The IT department is the wrong place to begin discussions about security solutions. It’s important to remember that all or part of the budget for security solutions will come from a line of business or the operating budget, not from the IT department. Although IT will most likely be involved in security solution evaluation, deployment, and maintenance, you’ll be able to develop and implement a more successful solution by involving the line-of-business managers. For many clients this level of collaboration between IT and the business will be a new experience with rewarding results. Overcoming Potential Concerns There are some potential concerns from clients who are buying security solutions for the first time. Make sure that you discuss them, because if you don’t bring them up, someone in their organization will. A pre-emptive strike will save you time and sales headaches. Below are concerns you should be sure to address. Security and system performance––the impact to performance must be balanced against the potential threats to the business. Each generation of malware is becoming more sophisticated, more difficult to detect, and—once it takes root in the system—even harder to remove. Work with your client to determine the right balance between potential impacts to system performance and the resulting loss of employee productivity, risk to sensitive data, and financial impact to stolen or vandalized equipment and systems. Integration with existing technology––a growing concern for small- and medium-size business owners as security threats become more sophisticated and the technologies to combat them become more complicated. This is a sales opportunity for you. Show your clients how you can support them through this process by educating them on the services you are offering as a part of your Security Solutions practice. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 30 Ingram Micro PracticeBuilder Equipment life––common client myths about the life span of security devices and equipment require a dose of reality. The truth is most security devices have regular software or firmware updates to keep guard against the latest threats. Customer receptivity––look for examples of security solutions serving the same market. Ask clients about their experience with security and security breaches. Most companies experience multiple security threats and several security breaches each year. Share some of your stories and ask your clients about their experiences. Operating costs––help them understand the ongoing costs of power, setup and management, testing, and equipment depreciation. Compare these with the costs of a security breach. Remember to take into account the value of customer relationships, their business reputation, and business results. A security breach can mean more than lost orders; it can also lead to lost customers. “I don’t need it, my existing security solutions are fine”––very few clients are completely satisfied with their security solutions, and the threats to security are constantly changing. Technologies are continuously being developed to address these new dangers. Look for places where there is an obvious opportunity. For ideas, look at the next section about target client profiles on page 33. Selling Security When approaching your clients about a security solution, mention these critical points: The process of creating a security solution will help uncover inefficiencies and reduce or, in many cases, eliminate them. The security solution will be implemented as transparently as possible with minimal business interruption. A security breach is much more disruptive. The security solution will work to enhance business growth. Follow these steps to find new clients for your security solutions: 1. Select a progressive or innovative client who you think could benefit from security solutions and review their business for opportunities, in particular look for clients who have suffered a recent security breach 2. Go to lunch with the CEO, marketing or sales VP, and discuss protecting their business with improved security 3. Compile news articles that talk about the latest security breaches and the impacts to the targeted business, give examples in your client’s industry © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 31 4. Discuss business processes that could be improved with security solutions (e.g., access management, compliance, protecting critical data, etc.) 5. Sell security solutions through a discussion of data and asset protection, not from a hardware and software implementation viewpoint 6. Create a relevant ROI measurement plan 7. Help them “find” the funds by engaging support from the auditing and legal departments 8. Calculate the cost of delaying the installation 9. Ask for their commitment Policy Review Remember to review your client’s network security policy. If they don’t have one, then that’s where you begin the consultation because that’s where most companies are at risk with their network. After you understand their security policy and have made appropriate recommendations to bring it current, then approach the departments in the organization, including IT, to discuss network implementation, security enforcement, and network enhancements. Policy: Examine the security policies, if they have them. If the policies are current, you can audit their policies as part of the assessment to make sure that they are complying with management mandates. What legislation do they need to comply with? Incident Response Planning: What is the procedure when something goes wrong? Who responds? Enforcement: How are policies measured? Who enforces them? Security Policy Assessment Questions Physical Security Review: How is the computing infrastructure secured? How about individual computers? How about mobile devices? Current Anti-Malware Protection: Are they up-to-date on malware detection and removal tools? © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 32 Ingram Micro PracticeBuilder Intranet Vulnerability Assessment: What are the issues with internal access to the network? Internet Vulnerability Assessment and Penetration Testing: What are the weak points in their Web connection? How many IP addresses and hosts can be reached? Firewall/UTM Reviews: What firewalls are being used? Are they up to date? Are they the right level of protection? WLAN Security: Look at the security settings and radio footprint, are they confining access to validated users in the authorized area? Virtual Private Network Assessments: How are remote users accessing corporate data via the Web? How are they implementing VPN? How are executives accessing corporate data from home? Is that network secure? Dial-In Security Testing: What happens if a remote user connects into the network? Security Awareness Training: How are users trained on network security policy? Social Engineering Awareness: What are the likely threats to the organization (such as phishing, and other ID theft scams)?18 Compliance Auditing Tools: What are their compliance requirements? Are they current and up-to-date? What programs are in place? Have there been any violations? Patch Management: Are they: maintaining current knowledge of available patches, deciding what patches are appropriate for particular systems, ensuring that patches are installed properly, testing systems after installation, documenting all associated procedures (such as specific configurations required)? 18 Social engineering involves tricking a person into a behavior, like loading a malicious program. For example, an employee finds a disk labeled “Executive Salaries” in the parking lot. Curious, they put it in their machine, open the files, and inadvertently infect their computer and any unsecured machine on the network. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 33 Target Client Profile Your ideal prospect for a security solution is an organization that needs to protect data and assets that are accessible via the network. Also look to companies that need to protect physical assets and people through video surveillance. Companies are under attack from all sides, from the cyber world of the Internet and email, to the physical world of homes and offices. While most companies of more than 1,000 employees have at least basic security policies in place, most small- to mid-size companies have only made a cursory attempt at security. Executives and owners think, “We’re too small. No one will bother us. Besides, we can’t afford more security.” That may have been true in the past. Not today and not in the future. Here is a list of things you can offer your client. Data and Asset Protection Ensures regulatory compliance and protects against liability Manages customer records and financial information in a secure environment Safeguards intellectual property Sales Productivity and Operating Costs Makes sure that information critical to revenue generation is available and secure Makes secure access to product information, pricing, and process and procedure documentation required to make sales easier Although security is not limited to a particular vertical market, it has been most successful where the potential consequences of a data breach have a large financial impact or could create a liability issue. Here are additional applications where security has definite value for your client: Communications—ISPs Mitigates attacks by botnets Prevents DDoS (directed denial of service) attacks © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 34 Ingram Micro PracticeBuilder Protects customer information Education Complies with government-legislated regulations Provides secure access to student information online Monitors locations susceptible to theft and vandalism over large physical areas Routes IP video surveillance to authorities responding to emergencies Finance and Banking Complies with government-legislated regulations Protects against theft and fraud (In 2005, credit card processor Cardsystems, Inc., was sued for the potential compromise of 40 million credit card numbers.) Protects against business downtime Government Protects human life Analyzes security threats real-time Maintains security under challenging or dangerous environmental or security conditions Monitors physical security concerns at multiple sites Healthcare Complies with government-legislated regulations Safeguards patient privacy Provides secure access to medical records online Allows IP video surveillance security of patients, offices, and grounds © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 35 Insurance Complies with government-legislated regulations Manages operating costs that affect increases in premiums Provides secure remote access to records Manufacturing Makes access to production information quick and reliable Protects production information from unauthorized access Retail Ensures a safe and secure environment for employees and customers IP video surveillance curtails losses from theft, fraud, and error Allows for investigation of merchandise “shrink” Improves customer service Transportation Protects logistics information from unauthorized access Curtails losses from theft, fraud, and error IP video surveillance monitors physical security concerns at multiple sites Value to Your Client The courts have almost always made businesses responsible for the security of their customers and associated data, and legislators have passed many mandates for corporate responsibility. For example, the Sarbanes-Oxley Act defines records retention and corporate governance, the Gramm-Leach-Bliley Act and the Data Protection Act in the United Kingdom demand control of personal information, and HITECH spells out behaviors for healthcare providers and others. When your customers make security part of their business processes, it’s easy to illustrate that they’re taking reasonable care in the event of a lawsuit, minimizing © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 36 Ingram Micro PracticeBuilder exposure. Where threat, vulnerability, and financial impact matter, they are liable for risk management and mitigation. In this day and age, security always makes sense. But it becomes critical in these situations: Protecting confidential data Complying with regulatory legislation Ensuring continuous business operations Preventing theft of business assets, including intellectual property Protecting the physical security of customers with technologies such as video surveillance © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 37 Up-sell and Cross-sell Opportunities Look at these areas of hardware, software, services, and infrastructure management solutions that you can offer your clients: Hardware 10/100/1000 Network Interface Cards (NICs) Audio devices Cabling or wireless LAN access points Firewalls Hubs Monitors/LCD panels Power and audio signal cabling Proxy servers Security locks Storage devices Switches and routers Wireless gateways Software Anti-spyware, anti-spam, and anti-virus Content filtering Customization and implementation Evaluation and selection Remote monitoring Sponsorship billing Threat detection and early warning © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 38 Ingram Micro PracticeBuilder Services Content filtering/Web monitoring Data backup and storage Email security Gap analysis and testing Identity management Network monitoring and response Policy compliance management Remote equipment monitoring Remote firewall management Security policy development, documentation, and implementation Security Infrastructure Management Audit and compliance reporting Hardware and software inventory detection Patch management Remote management SLA assurance Trouble ticketing VPN-client software Vulnerability assessment and remediation Adjacent Technologies Help You Complete the Solution Mobile Computing One technology related to security is mobile computing. A handheld wireless solution gives users the ability to remotely monitor video feeds and instantly redirect camera images to law enforcement. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 39 Storage With the rise of government standards and the ever-increasing need for data management, storage technology is growing. Add IPVS and the demand for storage can skyrocket. Today’s small and midsize networked businesses must find a way to add and streamline storage capabilities. AIDC/POS Technology Your customers will want to incorporate security observation into their retail systems. Automatic Identification and Data Capture (AIDC) enables users to collect data via automated means such as radio frequency identification (RFID), barcode scanning, biometrics, smart cards, optical character recognition (OCR), or magnetic stripes and subsequently store that data in a computer. A complementary technology, Point of Sale (POS), uses PC-based terminals, barcode scanners, receipt printers, credit/debit terminals and more to give retailers comprehensive views of their business operations––enabling them to increase efficiency and profitability, while making knowledgeable business decisions. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 40 Ingram Micro PracticeBuilder © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 41 Executive Questions The questions that follow will help you to have conversations with CEOs, line-ofbusiness managers, CFOs, and IT business leaders that help uncover the answers you need to discover your client’s most compelling business reasons for implementing a security solution. Begin your discussions with a review of their security policy. If they don’t have one, then that’s where you begin the consultation engagement. After you understand their security policy and have made appropriate recommendations to bring it current (as necessary) then approach the departments in the organization, including IT, to discuss implementation, enforcement, and enhancements. Use these strategies when you approach your customers to make sure that you offer a complete security solution. Sell from the top down and the bottom up Start by examining their corporate security policy Address physical security issues (including IPVS) Address network security issues Address legislative compliance issues Address identity theft issues Address on-going security assessment and product security updates When asking questions, it’s a good idea to record your client’s answers word for word. You’ll want to use their vernacular and industry language when constructing your report and action plan. Your questions will depend on your audience. These are great questions to ask if you only have five minutes with key people. CEO, Sales VP, Marketing VP What concerns do you have about the security of your operation, including your data, systems, and people? What are the threats to your organization? (Identify what your customer perceives as being potential issues) © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 42 Ingram Micro PracticeBuilder What would happen if there was a security breach? What would it take to get back to normal? What would that mean to your business competitiveness? If an incident, such as a theft, were to strike your operation right now, how long would it take to get back into business? (Identify the business impact of a security breach) Are you familiar with the benefits of protecting your intellectual property? Did you know that 70 percent of companies that suffer a serious data loss or security breach go out of business? Are you required to comply with government or industry regulations for security? What are they? (Identify business-driving compliance mandates) Will you personally be on the hook for during a breach? When was it last tested? When was it last reviewed? Who is responsible for enforcement? (Identify the details of your customer security policy, including current security processes, procedures, and products) In planning or considering new security technology, how will you measure your success? CFO What would be the impact of a security breach on your operation? What are the risks and the costs of these threats? (Identify the financial and business impact of the risks) How are you personally liable? (The personal impact of a security breach is a powerful motivator) What should you do to manage the risk of a security breach? What security mandates are you responsible to enforce? How are you doing that right now? What is the financial impact of downtime on data systems? Many of our clients have learned that ROI is more difficult to calculate with this kind of project because of the many ways that security impacts business. What kind of ROI are you expecting from this project? How are you planning to measure your ROI? In planning or considering new security solutions, how will you measure your success, especially in terms of cost? © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 43 IT, CIO What kinds of computer platforms are you using now? What operating systems do you have to support? What applications are you supporting? What are the interdependencies? What does that do to your system security? How would you like this to change? How do you effectively manage the growth of your IT infrastructure? How do you accurately plan, forecast, and budget your capacity? How many locations do you have? Where are they? What are your strategies for data protection? How much downtime is security related? What is your security policy? How do you enforce it? What departments have talked with you about security? What resources will you need in order to feel comfortable implementing a new security solution? What are your concerns about your security solution? What do you need to feel comfortable before bringing a security solution to your site? Detailed Questions These questions will elicit the information you need to prepare your Report of Findings and your Proposal. With answers to 80 percent of these questions, you will have a solid knowledge base upon which to build your solution. What are your concerns about protecting your company’s assets and reputation? This question identifies key benefits that work well with security and help your client win support for the plan within his or her organization. What frustrates you about your current security policies and processes? This question explores new opportunities for complementing their existing business processes. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 44 Ingram Micro PracticeBuilder What behavior do you want to have happen? Security solutions can compel behaviors that protect your client’s business assets and reputation, ensure productivity, and lower operating costs. Find out what those behaviors could be. What should they be aware of? Your client may be able to use security solutions as a competitive advantage. For instance, financial institutions, healthcare and insurance companies, and government organizations are all subject to regulation. Security solutions may help meet these requirements. Help your client understand how this would benefit their business. What would happen to customer satisfaction if you suffered a security breach that compromised confidential data or prevented you from meeting your contractual obligations? This question helps to identify key business drivers for implementing security solutions while creating a sense of urgency in your client. How would you measure the effectiveness of this project? This uncovers what they want to have happen to their business. You can then present the most compelling aspects of your Security Solutions practice to motivate them to make a commitment. What would it be worth to manage the risk of a security breach? This helps present the business case to motivate them to move fast. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 45 Creating a Business Case for Security Solutions These are the areas that contribute to business productivity, generate profitability, and improve competitiveness. Consider these factors as you create your business case and develop return on investment (ROI) scenarios that are relevant to your client. Calculating Solution Costs Consider the following, some of the primary costs of the solution: Hardware Refer to the list on page 37 Software Refer to the list on page 37 Services Refer to the list on page 38 Security Infrastructure Management Refer to the list on page 38 Labor Evaluation of solution options Migration costs System design, installation, and testing System management and maintenance User training, including wages and overhead Vendor research © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 46 Ingram Micro PracticeBuilder Calculating ROI Benefits The benefits of a security system are quickly realized when your client understands the value of their security processes and technology. Look at both the direct and indirect costs, as well as the value of the solution in terms of relationships, reputation, and results when calculating the return on this investment. Direct Costs Direct costs are what your client pays to undo the damage of a security breach. Depending on the severity of the incident, it can range from a few dollars to closing down the company. Potential costs include: Losing intellectual assets such as custom software Re-creating lost, corrupted, or deleted data Replacing lost physical assets such as equipment, supplies, and even the physical plant Cleaning up and repairing the damage—emergency repairs often cost more Notifying customers of a breach of confidential information19 Paying for public relations to reposition the event in your client’s favor Educating employees, customers, and vendors about the breach and how to prevent a recurrence Communicating with shareholders, explaining what happened and what your client is doing about the breach Defending against legal actions—what is the legal exposure because your client cannot fulfill contractual or mandated obligations 19 Concerned with ID theft, California’s Database Security Breach Notification Act (SB1386) requires that customers be notified if a company believes a computer system’s breach has compromised the personal information of any California customer. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 47 Indirect Costs Indirect costs are the expenses that your client will incur in the form of lost business—the revenue and profits that would have been earned if the breach hadn’t happened. Lost present business. How much will your client lose, per hour, if the company’s security is breached? Look at internal and external interdependencies between your client’s business processes and those of their customers and vendors. Lost future business. What does it cost when your client can’t respond to a customer or prospect request? Customers may require your client to implement new levels of security or demand new service level agreements before they will continue to do business with your client. Lost competitive edge. What happens to your client’s market position if the facilities suffer a security breach? Loss from negative public relations. A negative story about your client becomes positive marketing for the competition. Shareholder lost confidence. What happens to the value of stock when shareholders lose confidence? Lost employee productivity during restoration. The Value of Security The sustained growth and popularity of the security market is fueled by several business drivers and ROI factors, including the desire to: Protect critical assets required to operate and profit Reduce business interruptions caused by security breaches Comply with corporate and legislated security mandates Reduce legal exposure from unsecured premises and computer systems Recover rapidly from a security incident or a disaster (maintain a competitive edge through resiliency—especially when the same threat or disaster strikes both your client and their competitors) Attract future investors/partners/customers by providing an investment that has a sound security strategy and policy © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 48 Ingram Micro PracticeBuilder Increase staff efficiencies because employees don’t deal individually with security issues like spam and viruses Increase operational efficiency created by the security system due to upgraded technology Eliminate the cost of security breaches from unpatched software Increased incremental sales and stockholder value based on your client’s improved security and stability Running the Numbers It’s difficult to create return on investment (ROI)20 numbers that satisfy everyone. In some cases, your client may just want to avoid another attack; forget measuring ROI, just help them avoid a future occurrence. If a business partner (or a client customer, for that matter) demands a higher level of security, your client may have to mark up your services to cover the costs. One way to establish the value of a security solution is to calculate the system’s reduction in loss by taking the difference of the average annual loss expectancy with and without mitigation. Loss reduction = Loss without mitigation – Loss with mitigation The amount of loss reduction is the most your client should spend on mitigation. Frankly, some losses aren’t worth insuring against. The value of the security solution is the difference between the cost to mitigate and the loss reduction provided by mitigation. Value of mitigation = Cost of mitigation – Loss reduction Repeat the calculation for each component of your client’s security system to determine the overall ROI. The challenge to these calculations is assessing the probability and cost of a threat, as well as the reduction of risk your client will gain by implementing a specific security solution. Historical data can suggest the likelihood of a specific threat. Losses can be estimated by the costs to repair the damage, the costs of idle employees, and estimated business loss. 20 Sometimes called Return on Security Investments (ROSI). © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 49 How to Generate a Winning Proposal Most solution providers use a proposal as a sales tool; they evaluate the situation and create a written document recommending what the client should do next. Then they send the proposal to the client, hoping and praying that the client won’t pick it apart and will say, “Yes.” Of course, it’s a rare client who agrees to a proposal without changes. Many proposals are rejected because of this method. Don’t call your document a proposal. Refer to it as a “Report of Findings and Action Plan.” This creates much more value and positions it as more than a proposal to get the customer’s business. You’ll see a sample in the next chapter. For this reason we recommend that you never create a report until you know that a client is ready to buy from you, that they understand the value of the solution, and feel confident that you can do the job. How to Properly Use a Report of Findings Use this document to confirm the details that you’ve already agreed to during your discovery meeting with the client. It puts all of the details into one document so that your client can say, “Yes,” and you can proceed with the project. Your winning proposal for a security solution outlines these elements: A brief recap of the business situation The business objectives of your client and the associated deadlines How you will measure the value of meeting these objectives The expected value to the business when these objectives are met, including the hard value (money in the bank) and soft value (people are happier) Outline the methodology and offer other options Show the timeline required to reach the objectives by their deadline Describe your role and their role in the project, including any impact that slippages will have on the project outcome Include your terms and conditions Have a place for them to sign to begin the project © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 50 Ingram Micro PracticeBuilder © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 51 Report of Findings and Action Plan Template Use this template to get started writing your action plan. As you know, you’ll match your client’s motivation and gain agreement when you use their reasons to move forward with the project. This sample template has minimal “boilerplate” content, because you don’t want it to get sent to the legal department. This form leaves room for you to use your best judgment and the information that you gathered from your interviews. Services This is what you plan to do and the justification based on your client’s answers to your questions. The proposed project methodology consists of eight separate phases, as described below. Phase 1—Pre-planning Activities (Project Initiation) Use this phase to obtain an understanding of the existing and projected security solutions. This enables the project team to refine the scope of the project and the associated programs, develop project schedules, and identify and address any issues that could have an impact on the delivery and the success of the project. Two key deliverables of this phase are the development of a policy to support the programs and an awareness program to educate management and senior individuals who will participate in the project. Phase 2—General Definition of Requirements Identify what business outcome is desired and the options to achieve that outcome. This phase will include the key tasks outlined in the Security Project Planning Checklist found on page 63. Phase 3—Business Impact Assessment (BIA) Identify how the security solution will augment business processes, including sales. This can be done with trial installations or by examining industry case studies. Use the information gathered in the Security Opportunity Profile on page 57. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 52 Ingram Micro PracticeBuilder Phase 4—Detailed Definition of Requirements During this phase, a profile of security requirements is developed. This profile is to be used as a basis for analyzing alternative strategies. The profile is developed by identifying resources required to support critical functions identified in the previous phase. This profile should include hardware, software (vendor supplied, in-house developed, etc.), documentation (server, user, procedures), outside support (networks, content creation services, etc.), facilities, and personnel. Another key deliverable of this phase is the definition of the plan scope, objectives, and assumptions. Phase 5—Plan Development During this phase, security plan components are defined and documented. This phase also includes the implementation of changes to user procedures and upgrading existing security procedures required to support the plan. Phase 6—Testing/Exercising Program The plan testing/exercising program is developed during this phase. Testing/exercising goals are established and alternative testing strategies are evaluated. Select testing strategies tailored to the environment and establish an ongoing testing and monitoring program. Phase 7—Maintenance Program Maintenance is critical to the success of a security solution. The plans must reflect the environments that are supported by the plans. It is critical to revise existing change management processes to take into account the maintenance of security solutions. In areas where change management does not exist, recommend and implement change management procedures. Phase 8—Initial Plan Testing and Implementation Once plans are developed, conduct initial tests of the plans and make any necessary modifications to the plans based on an analysis of the test results. Use the information from the Security Installation Checklist on page 69 to help. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 53 Predicted Outcomes Here’s where you discuss the predicted outcomes that have come from the Executive Questions on page 41. This section should match the client’s criteria words that you’ve noted. Software Specs Add the software specifications from your data sheets. Hardware Specs Add the hardware specifications from your data sheets. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 54 Ingram Micro PracticeBuilder © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 55 Glossary 10-Gb Ethernet is the newest and fastest version of Ethernet; 10 Gb is the best choice for supporting high-bandwidth applications (remember, 10 Gb devices will not perform at maximum speed without the appropriate network infrastructure). This may be an ideal network backbone for new IPVS installations. 802.11 Wireless Standards––new versions of this standard with more security features are continually being released. When evaluating the need to add secure mobility to a network, it may also be time to consider wireless as a solution. Business continuity (BC), sometimes called disaster recovery (DR) or business process contingency (BPC), describes how to deal with disasters or breaches that make normal operations impossible. DDoS and DoS—Compromised computers called botnets are used to launch a directed denial of service (DDoS) attack on a Web site or email server. A botnet bombards the target site with Web page requests or spam, overloading the server, making it unavailable for legitimate users, called denial of service. Think of DDoS as creating a computer busy signal. Failover is a backup operational mode in which the functions of a system component are assumed by secondary system components when the primary component becomes unavailable through either failure or scheduled down time. GLB is the Gramm-Leach-Bliley Act (GLB Act), also known as the Financial Modernization Act of 1999, a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals. HIPAA is the United States Health Insurance Portability and Accountability Act of 1996. Health Information Technology for Economic and Clinical Health (HITECH) extends the complete Privacy and Security Provisions of HIPAA to business associates of covered entities. ISO 27002 standard is the rename of the ISO 17799 standard and is a code of practice for information security. It basically outlines hundreds of potential controls and control mechanisms, which may be implemented, in theory, subject to the guidance provided within ISO 27001. Maximum Tolerable Downtime (MTD) is how long a business function can be unavailable before the organization will be out of business. Payment Card Industry Data Security Standard (PCI DSS) is a set of guidelines developed by the credit card industry to help those processing credit © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 56 Ingram Micro PracticeBuilder card payments and storing or transmitting data to minimize the threats of fraud and other security vulnerabilities. Compliance is mandatory, but companies processing fewer than approximately 80,000 transactions per year are allowed to complete a self-assessment. Recovery point objective (RPO) measures the time between the latest backup and a potential disaster. SLA is service-level agreement (SLA). It is a contract between a network service provider and a customer that specifies, usually in measurable terms, what services the network service provider will furnish. Oftentimes, failure to meet agreed-upon SLAs results in a monetary penalty assessed against the provider. SOX is the Sarbanes-Oxley Act of 2002. Often shortened to SOX, it is legislation enacted in response to the high-profile Enron and WorldCom financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 57 Security Opportunity Profile Account Profile Company name and location New account (how did you find them) or existing account (what have you sold them?) What is their mission? Is the department growing? How much? Why? How many employees? How many customers? What is the opportunity size? What is the lifetime value of this client? How easy (1-10) will it be to get this business? What other channel partners are involved? Key Player Profile (Name, phone, role, affinity) CEO COO VP Sales © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 58 Ingram Micro PracticeBuilder VP Marketing IT Director Legal Procurement Security Director Others: Authority Profile What is their buying process? Who is responsible for security policy? Who is responsible for making the commitment? Who is responsible for security enforcement? Who is responsible for disaster recovery? Who signed for the last purchase like this? Are they available? Have they purchased security solutions before? Affinity? Who needs an ROI analysis? What criteria? Who needs a risk analysis? What criteria? Technical Profile What hardware? What content platform? © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 59 What enterprise applications are they using? Mobile enabled? What databases are in use? What network-based applications? What other applications? Telephone systems? Security plan now? Backup location now? Disaster recovery plans? When was the plan last tested? Do they use consultants? Who? Needs Analysis What business need is being addressed? How does this project support mandated departmental objectives? What are the threats to the organization? What are the opportunities? What are they using now? What do they like best? What do they like least? What would they like to change? What’s the current solution cost structure? © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 60 Ingram Micro PracticeBuilder What products would be used to solve the business problem? How many locations are anticipated? Specifically, where? What physical locations need to be secured with video? Specify: Video storage and access requirements? Budget Profile Where is the budget coming from? What other departments can fund this? What would it be worth to move forward? What would it cost if nothing happened? What is the cost of downtime? What would be the cost of a data breach? Is this budgeted? Commitment Profile Who is most against this project? Who most benefits from this project? What similar projects are others doing? What staff is in place or what staff will be hired for this project? What project must finish before this one starts? © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 61 What deadlines have they committed to that require this project to first be completed? What are their internal deadlines? When is their dropdead decision date? When do they want to go live? What training will be required? How long? What is the recovery test schedule? Action Plan What is your strategic plan? What resources do you need? What Ingram Micro resources do you need? What vendor resources do you need? What are the barriers to getting this business? Who are the competitors? How can you neutralize them? What are the elements required to get this business? © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 62 Ingram Micro PracticeBuilder © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 63 Security Project Planning Checklist Company name and location(s) Who is responsible for the business outcome? Create metrics for measuring desired outcome Pilot project or full rollout? Scope? IT only? Network? Telecom? Physical locations? List to copy on all management level project memos Execute system design contract or letter of intent Who is responsible for security policy approval? Compliance mandates Business rules Metrics Approval process Who is responsible for security enforcement? © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 64 Ingram Micro PracticeBuilder Identify design specs: RPO RTO MDT TTO Identify property insurance liaison and discuss project Identify security liaison and discuss project Security issues Emergency access Non-emergency access Identify legal/compliance liaison and discuss project Compliance issues SLA Identify IT liaison and discuss project SLA Hardware © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 65 Middleware Applications Infrastructure Network (wired and wireless) Telecom Power Environmental factors Personnel factors (e.g., monitoring employees) Who onsite will facilitate installation? Who will facilitate training? Who will facilitate testing? Perform site survey at each location to identify risk and recovery issues and mitigation plans SLA Hardware (including video cameras) © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 66 Ingram Micro PracticeBuilder Middleware Applications Network (wired and wireless) Power Telecom provider Environmental factors Personnel factors Identify recovery infrastructure requirements Hardware Applications images Database images Network (wired and wireless) Telecom Power Personnel factors Identify solution specs Hardware (including video cameras and mounting methods) Applications images Database images Network (wired and wireless) Telecom © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 67 Power Environmental factors Choose vendors Hardware (including video cameras) Middleware Applications Power Network (wired and wireless) Telecom Identify any changes in property insurance to cover equipment Identify potential reductions in property insurance premiums because of recovery plans Discuss maintenance agreements and equipment insurance contracts Create installation plan schedule and test schedule © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 68 Ingram Micro PracticeBuilder Execute contract for project © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 69 Security Installation Checklist Company name and location(s) Order system components Expected delivery dates Order back-up network and telecom services Contracts through legal department Who onsite will facilitate test and maintenance? Create test and maintenance schedule Prepare for installation © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 70 Ingram Micro PracticeBuilder Inspect hardware and software on arrival Install and test software Mount “call for service” labels Install system onsite Hardware Applications images Database images Network (wired and wireless) Telecom Power Environmental mitigation Train users Hardware Applications Content Security Help desk Responsible party sign-off on installation © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 71 Train contacts responsible for maintenance Conduct test Measure outcomes Review and vigilance On-going training Updates for new threats Review outcomes with management Identify unexpected outcomes © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 72 Ingram Micro PracticeBuilder Performance Costs Benefits Create upgrade schedule Create plan for additional locations Gather testimonial letter specifying outcomes © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 73 Your Action Plan Now that you have a good understanding of what it takes to create a security practice, you need to put it into play. Here’s a simple step-by-step plan for the next 90 days. 30-day Plan Choose a Target Prospect Choose a prospect who you know could benefit from a security solution. Trust your abilities, and we’ll work with you as you grow your practice in exchange for your personalized attention to details. Sign a bilateral non-disclosure agreement (NDA) because you’re going to be discussing marketing and sales plans as part of your research. A benefit of this agreement is that your proposal will fall under the NDA, protecting your intellectual property and guarding the project from being reviewed by your competitors. Explore How You Can Help Them So, how can you help them? Do they need to protect confidential data? Comply with regulatory legislation? Ensure continuous business operations? Prevent theft of business assets, including intellectual property? Use the Security Opportunity Profile on page 57 to help. Ask the qualifying questions on page 41 to help you understand their business issues and know how you can help them with a security solution. Engage Ingram Micro Resources to Help Design Your Client Solution Call Ingram Micro technical resources to help you configure the hardware and software necessary to create your client solution. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 74 Ingram Micro PracticeBuilder 60-day Plan Choose Vendor Partners With Ingram Micro’s help, identify solutions that match your client’s business needs. Get to know these vendor partners because they will help you build your security business. Create and Implement Your Initial Solution With the help of Ingram Micro’s technical resources, configure and install your initial solution. Get Feedback from Your Client on Effectiveness Monitor your client’s success concerning the effectiveness of the security solution, helping them to tune their business processes to take advantage of their new technology. Write a Case Study for Internal and External Marketing Write a simple case study consisting of three sections: a business problem, technical solution, and business outcome. Include a photograph of your client’s business along with the case study. This is the most powerful marketing material you can use to grow your Security practice. Document the Sales Process You Used Identify the steps that you went through to close this sale so that you can repeat this process with other clients and teach it to your sales staff. Identify Other Clients in Your Practice with Similar Needs Make a list of other clients with characteristics that indicate they need security solutions. Contact them and offer your case study to illustrate your ability to deliver this type of solution. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 75 90-day Plan Consider Getting Vendor-Specific Certifications Talk with your Ingram Micro rep about getting vendor-specific certifications that will grant you access to more margin, more prospects, and more opportunity. Teach Your People Your Successful Sales Process Conduct classes with your sales people using this material, your own sales process, and your own case study. Officially Announce Your Security Practice to Your Clients Launch the expansion of your Security practice with a marketing campaign using your case study. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 76 Ingram Micro PracticeBuilder © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 77 Action Ideas that Will Make Me Money Use this page to jot down ideas as you read through this document. These are the ideas that will allow you to rapidly implement a profitable security practice. ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 78 Ingram Micro PracticeBuilder ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ ____________________________________________________________________ © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 79 Ingram Micro Services Ingram Micro Solution Centers These state-of-the-art facilities are designed to address all your training and customer demonstration needs. Use these facilities as an extension of your business; you can increase your productivity and profitability by offering trainings, seminars, proof-of-concepts, and demonstrations to help your customers make confident investments in technology. Visit www.ingrammicro.com/solutioncenter for details. Agency Express Develop fast, affordable, and customized marketing campaigns to increase your sales. Agency Express offers access to customizable template mailers, mailing services including postage, printing and delivery, as well as a database-ordering service to increase the effectiveness of your targeted campaign. Marketing funds are available to qualifying solution providers. Visit www.ingrammicro.com/agencyexpress for details. Technology Solutions Engineer Win incremental sales, gain a competitive advantage, and become a strategic partner to your customers by extending Ingram Micro’s world-class technical support into the field. Our technology solution engineers (TSEs) accompany you to customer sites to provide pre-sale consultative services and education. TSEs are also available to help you train your sales staff and conduct client seminars. To request assistance, call your Ingram Micro sales representative. CAP—Customer Advantage Program CAP is a goal-oriented partner program. Through CAP, Ingram Micro Solution Providers can request funding from manufacturer partners for training, events, advertising, promotions, etc. Customer-facing marketing activities are supported by our manufacturer partners through the On Demand Events (ODE). These events are centered around relationship building including open houses, grand openings, monthly customer networking events, and customer appreciation events. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 80 Ingram Micro PracticeBuilder Partner Connections Summit Ingram Micro Partner Connection Summits are three-day VAR conferences featuring high-profile keynote sessions and industry-leading educational content on business strategies and opportunities within the SMB market across key technology categories. The Partner Connection Summit provides you the opportunity to gain insight into best practices by networking with top manufacturers, key Ingram Micro executives, and your peers. Technology Boot Camps and Roadshow Seminars Our expert Technology Solution Engineers and Solution Center Engineers will provide sales and technical training through presentations, hands-on demonstrations of manufacturer products, and a facilities tour of the Solution Center during these two-day events. For information on upcoming events visit www.ingrammicro.com/events. Ingram Micro Services Network (IMSN) The IMSN is Ingram Micro’s industry-leading, solution-provider delivered professional services network and the cornerstone of the services division. Powered by IMOnsite, a proprietary service-management software platform, the IMSN allows solution providers to leverage an established, SLA-driven service infrastructure to expand geographic reach and improve services capabilities across North America. For more information please call (800) 235-4128. Manufacturer SKU’d Services Ingram Micro offers a comprehensive selection of services to help you grow your business and provide complete product solutions. Ingram Micro’s SKU’d Services includes thousands of services from more than 100 manufacturer and service providers. E-commerce Partner Referral Ingram Micro maintains relationships with respected e-commerce providers on your behalf. No matter what your e-commerce needs, we can find a partner to help. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 81 Ingram Micro Services Division (SPEX) This cost effective electronic–content subscription service aggregates and delivers information from thousands of IT and consumer electronics manufacturers—all in a standardized format ready to use on your company’s website. For more information about the Ingram Micro’s services division, visit www.ingrammicro.com/servicesdivision or call (800) 705-7057. Technical Support Services As an Ingram Micro customer, you’re eligible to take full advantage of our worldclass presale Technical Support organization. With over 150 trained and certified professionals, we take a consultative approach in helping your company to build complete solutions that address your client’s business needs. We even stay attached to your opportunity, working with your sales representatives to ensure you have an effective and cost saving solution to present to your customer. And if necessary, we’ll even conference in your client during the build or proposal process to help you qualify and quantify the value of the solution to their business. © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 82 Ingram Micro PracticeBuilder © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 83 Ingram Micro Contacts and Resources The Security Team Security Technology Solution Engineer (TSE) Chris Squier, 716-633-3600, ext. 66405 [email protected] Security Campaign Marketing Manager Erin McNiff, 714-382-1019 [email protected] Security Technical Support Help Desk [email protected], 800-445-5066, ext. 76102 Security Resource Site www.ingrammicro.com/security Other Useful Contact Information Ingram Micro Events Website www.ingrammicro.com/events Ingram Micro Services Network (714) 566-1000, ext. 24572 eSolutions Customer Support (ECS) E-commerce setup/support: (800) 616-4665 © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 84 Ingram Micro PracticeBuilder Ingram Micro Sales (800) 456-8000 Corporate Offices West 1600 E. St. Andrew Place P.O. Box 25125 Santa Ana, CA 92705-4926 (714) 566-1000 Corporate Offices East 1759 Wehrle Drive Williamsville, NY 14221-7887 (716) 633-3600 Customer Service Contact Customer Service from 8 a.m.–8 p.m., Eastern time, for any order and shipment concerns. (800) 274-4800 New Accounts (800) 456-8000, ext. 41 Ingram Micro West Return Facilities Attn: (insert RMA # here) Suite R 12510 Micro Drive Mira Loma, CA 91752 © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 85 Ingram Micro East Return Facilities Attn: (insert RMA # here) 82 Micro Drive Jonestown, PA 17038 Ingram Micro Financial Services Financial Services Consulting Desk: (877) 877-0035 (toll-free) Pre-sale Technical Support (800) 445-5066 8:30 a.m.–8:30 p.m., Eastern time © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 86 Ingram Micro PracticeBuilder © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 87 Premier Sponsors Cisco A key component of the Cisco Secure Borderless Network, the Cisco ASA 5500 Series Adaptive Security Appliances delivers superior scalability and a broad span of technology and solutions designed to meet the needs of an array of deployments. Offering seamless client and clientless access for a broad spectrum of desktop and mobile platforms, the Cisco ASA 5500 Series delivers versatile, always-on secure mobility integrated with web security and IPS for a comprehensive solution. Unlike most security providers that force you to choose between a high-quality firewall and an effective intrusion prevention system (IPS), Cisco combines the world’s most proven firewall with the industry’s most comprehensive, effective IPS for a powerful security solution. Cisco ASA 5505 Cisco ASA 5510 Cisco ASA 5520 Cisco ASA 5540 Cisco ASA 5550 Cisco ASA 5580-20 Cisco ASA 5580-40 Cisco ASA 5585-X with SSP-10 Cisco ASA 5585-X with SSP-20 Cisco ASA 5585-X with SSP-40 Cisco ASA 5585-X with SSP-60 Cisco ASA 5585-S10 Cisco ASA 5585-S20 Cisco ASA 5585-S40 Cisco ASA 5585-S60 © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 88 Ingram Micro PracticeBuilder Symantec Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com. SYMANTEC SOLUTIONS FOR SMALL BUSINESSES For companies with 5–100 employees, with limited IT staffing Security Endpoint Protection Small Business Edition Protection Suite Small Business Edition Mail Security for Microsoft® Exchange Brightmail™ Gateway Small Business Edition MessageLabs™ Hosted Email Security from Symantec MessageLabs™ Hosted Web Security from Symantec MessageLabs™ Hosted Instant Messaging Security from Symantec Information Protection System Recovery Server Edition System Recovery Desktop Edition System Recovery Small Business Edition Backup Exec™ Online Backup Endpoint Protection Small Business Edition Mail Security for Microsoft® Exchange® Brightmail™ Gateway Small Business Edition MessageLabs™ Hosted Email Encryption from Symantec MessageLabs™ Hosted Email Continuity from Symantec Management pcAnywhere™ Ghost™ Solution Suite SYMANTEC SOLUTIONS FOR MIDSIZE BUSINESSES For companies with 100–499 employees, with dedicated but limited IT staff and resources Security Endpoint Protection Protection Suite Enterprise Edition Endpoint Encryption Network Access Control Critical System Protection Mail Security for Microsoft® Exchange Mail Security for Domino® Brightmail™ Gateway Web Gateway Protection for SharePoint® Servers MessageLabs™ Hosted Email Security from Symantec MessageLabs™ Hosted Web Security from Symantec MessageLabs™ Hosted Instant Messaging Security from Symantec MessageLabs™ Hosted Email Encryption from Symantec Backup and Recovery Symantec Backup Exec™ System Recovery Server Edition System Recovery Desktop Edition Online Backup Enterprise Vault™ Protection Suite Enterprise Edition MessageLabs™ Hosted Email Continuity from Symantec MessageLabs™ Hosted Email Archiving from Symantec Management Altiris™ Deployment Solution from Symantec pcAnywhere™ © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 89 Additional Sponsors Fortinet Fortinet’s products and subscription services provide broad, integrated and highperformance protection against dynamic security threats while simplifying the IT security infrastructure. FG-30B-US Q93754 FG-30B-BDL-US FWF-30B-US BC3704 FWF-30B-BDL-US FG-50B-US N73829 FG-50B-BDL-US FWF-50B-US Y65110 FWF-50B-BDL-US FG-60C-US DC8940 FG-60C-BDL-US FWF-60C-US DF0112 FWF-60C-BDL-US FG-80C-US Y65142 FG-80C-BDL-US FG-80C-BDL-900-24 FG-80C-BDL-900-36 Q93755 BC3705 N73840 Y65111 DC8941 DF0113 Y65143 BL4876 BL4922 FG-80C-BDL-950-12 FG-80C-BDL-950-24 FG-80C-BDL-950-36 FG-80CM-US V10578 FG-80CM-BDL-US FG-80CM-BDL-900-24 FG-80CM-BDL-900-36 FG-80CM-BDL-950-12 FG-80CM-BDL-950-24 FG-80CM-BDL-950-36 FWF-80CM-US FWF-80CM-BDL-US FWF-80CM-BDL-900-24 FWF-80CM-BDL-900-36 FWF-80CM-BDL-950-12 FWF-80CM-BDL-950-24 BL4968 BL5014 BL5060 V10579 BL4877 BL4923 BL4969 BL5015 BL5061 Y65114 Y65115 BL4878 BL4924 BL4970 BL5016 FWF-80CM-BDL-950-36 FG-110C-US U76949 FG-110C-BDL-US FG-110C-BDL-900-24 FG-110C-BDL-900-36 FG-110C-BDL-950-12 FG-110C-BDL-950-24 FG-110C-BDL-950-36 FG-200B-US CC8311 FG-200B-BDL-US FG-310B-US Q90392 FG-310B-BDL-US FG-620B-US U76951 FG-620B-BDL-US BL5062 U76959 BL4880 BL4926 BL4972 BL5018 BL5064 CC8312 Q90396 U76961 Juniper Networks Juniper Networks security solutions provide fine-grained access control that identifies, mitigates, and fully reports on the most sophisticated security threats of the moment. vGW Series: ALTOR-CENTER-1 MAG Series Junos Pulse Gateways: MAG2600, MAG4610, MAG6610, MAG6611 SRX Series Gateways: SRX100, SRX210, SRX220, SRX240, SRX650, SRX1400, SRX3400, SRX3600, SRX5600, SRX5800 Junos Pulse Mobile Security Suite: ACCESS-MSS-50U-1YR, ACCESS-MSS1000U-1YR, ACCESS-MSS-250U-1YR, ACCESS-MSS-500U-1YR © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Page 90 Ingram Micro PracticeBuilder McAfee McAfee, a wholly owned subsidiary of Intel Corporation, is the world’s largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that help secure systems, networks, and mobile devices around the world, allowing users to safely connect to the Internet, browse, and shop the web more securely. Backed by its unrivaled global threat intelligence, McAfee creates innovative products that empower home users, businesses, the public sector, and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security. McAfee is relentlessly focused on constantly finding new ways to keep our customers safe. Manufacturer's Part Nbr EMMCDE-AA-AA EMMCDE-AA-BA EMMCDE-AA-CA EMMCDE-AA-DA EMMCDE-AA-EA EMMCDE-AA-FA EMMCDE-AA-GA EMMCDE-AA-HA EMMCDE-AA-IA EMMCDE-AA-JA EMMCDE-AA-AG EMMCDE-AA-BG EMMCDE-AA-CG EMMCDE-AA-DG EMMCDE-AA-EG EMMCDE-AA-FG EMMCDE-AA-GG EMMCDE-AA-HG EMMCDE-AA-IG EMMCDE-AA-JG EMMCDE-AA-AI EMMCDE-AA-BI EMMCDE-AA-CI EMMCDE-AA-DI EMMCDE-AA-EI EMMCDE-AA-FI EMMCDE-AA-GI EMMCDE-AA-HI EMMCDE-AA-II EMMCDE-AA-BA Product Description ENT MOBILITY MGMT PROD+ 1YR ENT MOBILITY MGMT PROD+ 1YR ENT MOBILITY MGMT PROD+ 1YR ENT MOBILITY MGMT PROD+ 1YR ENT MOBILITY MGMT PROD+ 1YR ENT MOBILITY MGMT PROD+ 1YR ENT MOBILITY MGMT PROD+ 1YR ENT MOBILITY MGMT PROD+ 1YR ENT MOBILITY MGMT PROD+ 1YR ENT MOBILITY MGMT PROD+ 1YR GSA ENT MOBILITY MGMT PROD+ 1YR GSA ENT MOBILITY MGMT PROD+ 1YR GSA ENT MOBILITY MGMT PROD+ 1YR GSA ENT MOBILITY MGMT PROD+ 1YR GSA ENT MOBILITY MGMT PROD+ 1YR GSA ENT MOBILITY MGMT PROD+ 1YR GSA ENT MOBILITY MGMT PROD+ 1YR GSA ENT MOBILITY MGMT PROD+ 1YR GSA ENT MOBILITY MGMT PROD+ 1YR GSA ENT MOBILITY MGMT PROD+ 1YR INSTI ENT MOBILITY MGMT PROD+ INSTI ENT MOBILITY MGMT PROD+ INSTI ENT MOBILITY MGMT PROD+ INSTI ENT MOBILITY MGMT PROD+ INSTI ENT MOBILITY MGMT PROD+ INSTI ENT MOBILITY MGMT PROD+ INSTI ENT MOBILITY MGMT PROD+ INSTI ENT MOBILITY MGMT PROD+ INSTI ENT MOBILITY MGMT PROD+ LA ENT MOBILITY MGMT PROD+ 1YR GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD GOLD 1YR GOLD 1YR GOLD 1YR GOLD 1YR GOLD 1YR GOLD 1YR GOLD 1YR GOLD 1YR GOLD 1YR GOLD GOLD PROD+ 26-50U Sonicwall Guided by its vision of Dynamic Security for the Global Network, SonicWALL® develops advanced intelligent network security and data protection solutions that adapt as organizations evolve and as threats evolve. TZ 100 TZ 200 TZ 210 NSA 240 NSA 2400 NSA 2400MX NSA 3500 NSA 4500 NSA E5500 NSA E6500 NSA E7500 NSA E8500 SRA EX6000 SRA EX7000 SRA 4200 SRA 1200 CDP 6080B CDP 5040B CDP 220 CDP 210 CASS 2.0 Email Security ES8300 Email Security 4300 Email Security 3300 Email Security 300 Email Security 500 Email Security ES6000 GMS UMA EM 5000 © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Security Solutions Page 91 WatchGuard WatchGuard XTM 5 Series appliances combine high performance, strong security, advanced networking features, and flexible management tools in one affordable solution for small to mid-size businesses. RSA Trend Micro © 2011 OCE Inc. Permission granted to reproduce for your company’s internal use. All other rights reserved. www.OCEinc.com Sponsoring Manufacturers Cisco Fortinet Juniper Networks McAfee RSA, The Security Division of EMC SonicWALL Symantec Trend Micro WatchGuard Technologies © 2011 Ingram Micro Inc. All rights reserved. Ingram Micro and the Ingram Micro logo are trademarks used under license by Ingram Micro Inc. All other trademarks are the property of their respective companies. Products available while supplies last. Prices subject to change without notice. 6/11 M-004963.05