• No results found

We Believe in Security with a Capital S

N/A
N/A
Protected

Academic year: 2021

Share "We Believe in Security with a Capital S"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

The number of attacks on IT systems has

increased dramatically in recent years, with

the style and approach of such attacks

chan-ging on a daily basis. In addition to the spread

of new viruses, incidences of industrial

espio-nage are snowballing. Only the targeted use

of customized security solutions can protect

your company’s intellectual property.

New laws and policies require management and IT personnel to make constant adjustments and remain vigilant. The issue of ‘data security’ is therefore a top priority for companies. However, a considerable amount of effort and expenditure are necessary to maintain the highest level of security.

arvato Systems will be happy to advise you in this area. We also develop and implement solutions on-site that satisfy operational and legal requirements (such as Basel III, SAS 70, the Sarbanes-Oxley Act, EU data privacy rules). Another option is to outsource your IT operations to our highly secure data centers.

Security Consulting by arvato Systems

We Believe in Security with a Capital S

Benefits at a Glance



Collaboratively designed,

cost-effici-ent security solutions.



 Scalable and forward-thinking

con-cepts.



 Ongoing system protection, always

up to date.



 High-availability systems with short

recovery times.



24-hour support, seven days a week. 

 Highly trained and certified

person-nel.



 Cost savings on internal manpower

as well as on training and certifica-tion measures

(2)

The arvato Systems Security Strategy

As a leading system integrator with our own data centers, data protection and the optimization of business pro-cesses form the foundation of our business. Our security strategy is based on five pillars and provides the frame-work for keeping risks as low as possible.

To ensure that the level of security chosen is proporti-onate – in terms of the investment made, the value of the information being protected, and implementation

Our principles for a comprehensive security strategy:



 Adjustment of guidelines and procedural instructions to

the company culture and applicable legal requirements



Reinforcement of security awareness through intensive

training programs and an open information policy.



Constant monitoring and measurable improvement

of security status through an Information Security Management System (ISMS).



Careful consideration of current IT investments, as well

as the importance of your data and its value for daily business communications.



Definition of security requirements on the basis of a

risk analysis and assessment.



Custom-made solutions for security policies and

secu-rity measures that fit our customers’ business goals.

costs – we never lose sight of financial considerations. We will continuously measure and monitor your security processes for effectiveness and adjust them to changing conditions.

We will find the right strategy for your company.

Feel free to contact us!

Contact

Jochen Weper An der Autobahn 200 33333 Gütersloh Phone: +49 (0)5241-80 899 51 E-Mail: jochen.weper@bertelsmann.de

(3)

Multi Protocol Label Switching (MPLS)

Firewall systems

Intrusion detection system

Intrusion prevention system

Web-proxy

Virtual Private Network

Authentication

Web Security

SSL-VPN

In today’s mobile world, communication takes place over the Internet or protected networks such as intranets or extranets. Data is delivered via a LAN, WLAN or WAN to the end-user. A high level of availability, performance, dependability, and security is essential for your business’s IT systems. This is only possible with the protection pro-vided by sophisticated security systems.

Securing servers and operating systems is one of the fundamental tasks of security management. By taking a variety of clever measures, arvato Systems ensures that servers and operating systems are physically and logically protected against unauthorized use or misuse:



Rule-based access authorizations. 

Change management process to keep systems

con-stantly up-to-date.



Anti-virus protection 

Regular system scans to check the effectiveness of

security measures

Personal firewall

Spam filter

Data encryption

Backup

Managed Mobile Device

Log-File Management

Recovery

Anti-Virus protection

Patch Management

Having stationary and mobile devices such as notebooks, smartphones, and tablets that are reliable, stable, and up-to-date also contributes to the security of the entire enterprise network. Professional support from arvato Systems immediately fixes security risks and provides uninterrupted service. Internet security solutions alongside frequent updating of programs and attack signatures help to secure workstations.

arvato Systems offers state-of-the-art security solutions for a wide variety of networks and customer demands. For example, private service areas ensure secure client separation in the event of external threats.

Network Security

(4)

Besc

hnitt

5 mm

Application Security

Access concept

Public Key Infrastructure (PKI)

Web Application Firewall

Spam filter

Cloud Security

Software partition

Anti-Virus protection

Identity Management

Role definition

Single Sign On (SSO)

Security solutions are an integral part of all our services.

Business Application Services:

Sophisticated access concepts, role definitions, and authentication solutions can be implemented to secure established enterprise resource planning software (ERP systems such as Microsoft Axapta, SAP), Microsoft Office software, and customer relationship management applications.

Workplace Services:

Securing workplace architec-tures and protecting data on mobile devices in the event of theft, loss, or improper use ensures that enterprise data stays where it is needed and does not fall into the wrong hands.

Communication Services:

Tamper-proof sto-rage of electronic correspondence is ensured using the latest technology. This includes the encryption of e-mails through PKI or Information Rights Management. Moni-toring mechanisms help to uncover security risks and address these promptly.

Network, Computing and Platform Services:

arvato Systems provides baseline security for your IT infra-structure. Network Security Services form the foundation here and includes basic security services such as firewalls, intrusion prevention, and Web security solutions. Secure access is provided to the IT infrastructure for mobile users, thereby protecting local data. Our portfolio is rounded off by Compliance Services, which ensure the secure handling of all business-critical data.

Physical Security

Video surveillance

Perimeter protection

Individual access control

Highly sensitive early-warning fire prevention systems geographically dispersed locations.

emergency power generators

Structural security zones

Physical security is essential for providing IT services. Our data centers are effectively protected by numerous secu-rity features, including perimeter protection, individual access control systems, effective climate control techno-logy, highly sensitive early-warning fire prevention sys-tems, video surveillance inside and out, redundant power supplies, structural security zones, and geographically dispersed locations.

Only authorized persons are granted access to these areas. Our own on-site security personnel constantly monitor access to the property and buildings. We believe that security depends not only on our technical expertise, but also on the combination of innovative technology with highly-qualified personnel.

(5)

Besc

hnitt

5 mm

In order to satisfy all these security standards itself, arvato Systems has itself audited regularly. We were one of the first enterprises in the world to be certified to the internationally recognized ISO 27001 security standard. Our service management is based on ITIL, the internatio-nally accepted framework of best practices for IT service organizations. This is the foundation for arvato Systems’ dependable service for customers all over the world.

Organizational Security

Security policies

Guidelines

Documentation

Audit

Process instruction

Certificates

Compliance

Improvement process

Chief Information Security Officer

SAS 70 / ISAE 3402

German Data Protection Act (BDSG)

What use are technological security measures if there is no general security concept in place? A company’s management is not only responsible for leading the company, it also has to implement adequate safeguards against all types of risk.

Intellectual property can only be protected and the legal requirements only met (e.g., data protection regulations) by introducing an appropriate Information Security Management System (ISMS).

Drawing on our extensive experience with enterprise security standards, arvato Systems will also advise you

on organizational security. Cost-efficient measures to protect physical and logical assets can be implemented on the basis of an existing ISMS, providing high levels of security. The intervals for reviewing and documenting risks associated with operational systems and processes can be defined in this way. It also helps in the implementation, constant monitoring, and development of security goals and determination of suitable measures.

At the end of this process, every employee will have clear policies and guidelines at hand for how they should deal with information and the facilities.

(6)

07/2012

Any questions? Please contact us.

arvato Systems

Jochen Weper

An der Autobahn 200 | 33333 Gütersloh

Phone: +49 (0)5241-80 899 51 | Fax: +49 (0)5241-806 899 51 E-Mail: jochen.weper@bertelsmann.de | www.arvato-systems.de

About arvato Systems

As a systems integrator, arvato Systems has been involved in successful projects for well-known companies in many different business areas for over 30 years. 2,000 dedicated employees work at 25 sites throughout the world.

As a subsidiary of arvato AG, the outsourcing service provider of Bertelsmann AG, we are able to cover the entire value-added chain. We rely on the combination of extensive industry expertise, technological knowledge spanning all manufacturers, genuine partnership, and true entrepreneurial spirit.

We offer comprehensive IT solutions for areas such as commerce, logistics and transport, manufacturing, and media, as well as support and administration. Our expertise in many strong technologies, including Microsoft and SAP, can be seen in our competencies in topics such as BPM, cloud computing, CRM, and e-commerce. A large range of infrastructure services such as managed services, as well as an application management system based on it, complete the range of services we offer.

References

Related documents

This monitoring generates large amounts of telemetry data streams (e.g. hardware utilization metrics) which are used for multiple purposes including problem detection, resource

Figure 6.3: Mean rate of head loss accumulation based on filter configuration at cold and warm water conditions without nutrient amendments ± one standard deviation.. This

It is the responsibility of the Chief People Officer of relevant Group Company to ensure that the updated names and email id of the various Business and Unit level Value

The degrees of depression, anxiety and hostility of the patients were assessed by the SCL-90-R scores, and the fighting spirit was measured by the Mental Adjustment to Cancer

the basis of measurements taken for technically comparable machinery which is representative of the.. NOTE 1 The single whole-body vibration emission value is

According to the Economic Commission for Latin America and the Caribbean, the population of slum households accounted for 32 percent of the region’s population in 2001 and

Nor do they have to subsidize bad drivers who in many other states may get more favorable treatment when driving related factors do not count most and some non-driving

The workshop’s three main objectives were successfully met in that it; (i) provided a forum for cross- country dialogue on the work undertaken through the Africa ECCD Initiative;