What security products and attached services do you specialise in?
TDL’s security practice provides customers with readiness security, resilience security and the security of recovery. Leading with partners that harness and support these principals, TDL counts Cisco, Microsoft, Ivanti, Palo Alto Networks as well as several innovative vendors, such as MalwareBytes and Bitglass, as part of the three R’s portfolio.
When did your company first get involved in this area?
In May 2017, TDL launched a new go-to-market model which encompassed a practice completely catered to supporting organisations increasing security requirements. Prior to the launch of the security practice, TDL delivered security solutions across the different realms of the specialist areas – from end user compute, to the data centre and the cloud.
What are your security credentials?
We have CISSP certified team members, Global Gold accreditation with Cisco, and are an Ivanti platinum partner.
Which distributors do you use?
TDL use Arrow, Bluechip, Tech Data, Synnex, Ingram Micro, Dicker Data and OrcaTech.
Heard about any cool development in the security space recently?
We are looking at the augmented security analytics space and the developments several vendors are making there. With the pressure on availability of security operations staff, and the need to identify and respond to security events, the use of AI and augmented threat intelligence is trending to become the norm.
Can you tell us about a recent security deployment you have done?
We are working with councils around the country, reviewing their posture against the ASD 'Essential Eight' and developing get-well plans to meet a level 3 standard against the capability maturity model.
What is driving customers’ security strategies?
Recognition that no organisation is immune from cyber threats and a greater awareness and involvement from management that the issues are not just an IT problem.
Security is…?
A journey. There’s not a time when a business can say they are finished with security given the constantly evolving threat landscape.