Bell Canada October 2020

Page 1

Digital Transformation in Cyber Security and Networks IN ASSOCIATION WITH

BELL

DIGITAL REPORT 2020


Digital Transformation in Cyber Security and Networks 02


03

www . b ell. ca


BELL

Bell’s Dominique Gagnon and Giovanni Sansalone guide us through digital transformation as it pertains to cyber security and network evolution

D

igital transformation is a critical imperative for companies across the world, but it can be a challenge to know where to begin. As

observed by Giovanni Sansalone, Vice President, Product Management at Bell, for those organizations undergoing digital transformation, there are 04

a number of factors that can impede success.

OVERCOMING THE CHALLENGES “The most common challenges come from initial resistance or a lack of desire to truly enact change. It’s important to have everyone accept that they need to change in order to stay competitive, either by improving on the way they serve their customers and employees or being more effective at generating awareness.” Overcoming that resistance to change, Sansalone explains, requires involvement from the leadership team to make it clear why such a digital journey is necessary. “The second challenge we encounter is a lack of expertise needed to understand the business problem from an end-to-end perspective,” says


05

Dominique Gagnon,General Manager of the Cyber Security Practice at Bell www . b ell. ca


Threats come from anywhere, so we protect you everywhere.


Akamai and Bell: Securing and accelerating content to meet growing demand Tony Lauro, Director, Security Technology and Strategy at Akamai, on its work to accelerate content, enable remote working and provide cybersecurity Tony Lauro is Director, Security Technology and Strategy at Akamai Technologies - the world’s first content delivery network upon its founding in 1998. “The co-founders of Akamai said that as the internet starts to grow, it will be almost impossible to have a single or even a cluster of servers handle the traffic from multi-millions of connections coming in. The solution was edge servers, and we’ve deployed over 250,000 of them geographically dispersed around the world closest to where the pockets of internet users are.” Akamai has since expanded its remit beyond accelerating content to offering cloud security services. The massive reach of the Akamai platform allows for unique insight into cyberattacks and other security threats. “We see about 25 to 30% of the world’s web traffic every day come across our platform,” says Lauro. “There’s major insights there that we can take to let us say this is bad traffic based on X, Y and Z. Over the years, we’ve expanded into protecting businesses from downtime against DDoS attacks as well as enterprise services to make sure that employees working from home can do so securely.” The company’s relationship with Bell Canada extends back to 2016, with the partnership highlighting the key competencies of both businesses. “Some of the things we’ve been doing include accelerating content,” says Lauro. “We deliver live streaming services for Bell Raptors content. The Akamai platform is able to accelerate that content and make sure it’s highly available for all the devices that want to stream it.” Like many companies, its customers want more content, on more devices, anywhere and at any time. “We’re helping support that mission of Bell Canada and also supporting the needs of the internet at large.” Lauro emphasises the fact that the company is ready to support the rapid digital transformations made

Tony Lauro @ Akamai

necessary by COVID-19. “Many companies are pushing out to mid-2021 to have any of their employees come back. Some are even saying they’re never going to come back to working in the office. But the challenges are still there. How do we make sure that while trusted applications are being accessed, that remote connectivity is not providing any additional risk to the trusted environment within the corporation?” Akamai’s solution has involved working to expand a Zero Trust methodology. “That’s a SASE model which effectively says, as you connect from the outside and you come to the inside to an application, you’re not going from untrusted to trusted. Everything is considered untrusted. So instead of providing network connectivity to access an internal application, you’re just providing an application experience.” Lauro sees that change to remote work as being a continuing trend for the Akamai-Bell partnership to respond to. “Companies are asking: how do you securely monitor the user experience that users are having while they work remotely? How do you monitor security on those devices to make sure that any corporate data is not compromised? The remote work model, alongside the digital transformation of all the other services that organisations are already trying to, is going to continue to grow and be a key driver in the year ahead.”

akamai.com


BELL

“ We focus on identifying what we are trying to improve in regards to the business problem that we’re trying to solve together”

08

— Giovanni Sansalone, Vice President Product Management at Bell

Sansalone. “Many customers have expertise in certain areas, but when taking a holistic view, they often need to reach out and ask for advisory services in order to support them at every stage of their journey.” Once organizations overcome these cultural and managerial obstacles, the problem of pre-existing technology rears its head. “The question faced is: how do you enable legacy infrastructure to support the various digital assets that you’re putting in place? How do you bridge the two worlds and connect and communicate between them?”

TRANSITIONING TO THE CLOUD One approach is transitioning to a cloud based platform. To take full advantage of cloud applications, enterprises need to decentralize access to those applications in order to provide a better user experience. “That decentralized approach, however, can be difficult to control and is more permeable from a penetration perspective. It requires a different approach, such as deploying controls in remote offices or leveraging cloud-based security.” says Dominique Gagnon, GM, Cyber Security Practice


at Bell. “There are many benefits to mov-

in partnership with Zscaler, a fully-

ing to cloud-based security, including

managed, cloud-based, secure

ease of operations, and cost reduction.”

access service edge (SASE) internet

The compromise, however, is the intro-

protection service. “The benefit of

duction of latency.

our service is that we deploy Zscaler’s

The best answer is adopting a hybrid

technology within our Bell infrastruc-

approach. As he explains, it’s clear that,

ture, giving our customers access

while contributing enormous benefits,

to all of our nodes across Canada,

digital transformation and moving to

thus helping to remove the latency

the cloud comes with many challenges.

challenges commonly faced by our

That tension is exactly what Bell’s offer-

customers who deploy a full cloud

ing seeks to remedy. “We just launched,

architecture,” says Gagnon. 09

E X E C U T I V E P R O FILE :

Dominique Gagnon Title: General Manager, Cybersecurity Practice Dominique Gagnon is the General Manager of the Cyber Security Practice at Bell with over 25 years of practical and educational experience in IT. Prior to Bell, Dominique was the VP Consulting Services at CGI managing the government vertical and leading the Canadian Cyber Security Center of Excellence Sales, Delivery and Operations. Dominique has expertise in P&L management, business engineering, strategic engagement management and infrastructure management with a focus on cyber security. He has negotiated, implemented and managed numerous large outsourcing contracts and led transformations and transitions for several large organizations. Dominique also served for 12 years in the Canadian Armed Forces. www . b ell. ca


Enable WorkFrom-Anywhere

Build a plan for supporting work-from-anywhere Enabling work-from-anywhere isn’t a one-and-done job—it takes the whole IT organization. Security and networking teams must come together to build a plan for moving forward in a way that serves business needs. Begin building your plan with the help of these resources.

Learn more


Enabling remote work: how IT can plan for 2021 and beyond

Kevin Magee of Microsoft Canada and Zscaler’s Lisa Lorenzin, discuss the benefits of a zero trust approach for enabling remote working “The initial response to COVID was: ‘we’re going to move everything temporarily to the cloud and we’re going to get through this, and then we’re just going to revert back to how things normally were,’” says Kevin Magee, Chief Security and Compliance Officer at Microsoft Canada. “And this crisis has really made businesses come to the realisation that they have to change what they’re doing if they’re going to secure their organisations for the future.” While traditional conceptions of hard perimeter firewalls have their place, an evolution is now required in the new world of work. “If you were starting from scratch today, there’s no way that you would do a hard perimeter like that because cloud and mobility have made that hard perimeter, no longer sufficiently agile or sufficiently scalable,” says Lisa Lorenzin, Director, Transformation Strategy at Zscaler. However, Lorenzin explains that you’re not starting from scratch in most cases, so having collaborative partners like Microsoft and Zscaler working together can add value to a company. “Helping organisations transition through a transformation journey is where the guidance of Microsoft

and Zscaler working together with a strong connectivity partner like Bell Canada can really make a difference,” adds Lorenzin. A zero trust approach sidesteps many of the challenges now being presented, as Lorenzin explains. “It’s about having a world of contextbased trust where the user may be on-premise or-off premise. The application may be in the data center or in the cloud, but the principle of zero trust still applies, which is: I don’t implicitly trust anyone to do anything.“ “Zscaler can offer network access that still provides the visibility and security that IT and Security needs to run and secure the business, but vastly increases the user experience. Employees that are happy to use applications are better able to serve their customers,” says Magee. With such a transition taking place, Magee sees benefits across the IT professional landscape. “There’s been a positive shift in morale because we are finally delivering on the promise of zero trust, conditional access and a safe user experience that does not compromise security.”


BELL

Bell Canada – Benefits of Cloud Services CLICK TO WATCH

|

1:36

12

“We’re transforming at the heart of our network infrastructure” adds

communicate with their applications, or users, in a secure manner.”

Gagnon, “and virtualizing the network so that businesses can leverage the

KEY CONSIDERATIONS FOR SUCCESS

cloud – spinning up different types

The first key area that companies

of services in order to adapt to the

should focus on is culture. As Gagnon

changing requirements of the busi-

points out, “organizations need to first

ness. Our innovative platform delivers

think about the leadership that they

network-as-a-service to its customers,

put in place to establish a culture that’s

giving users greater control over the

open to necessary change and to

way they interact with the network and

doing things differently.”

how they access different services.

The second key ingredient is to focus

We’ve embedded security directly into

on the business. “We have a very cus-

our network, so that customers can

tomer-centric approach in everything


we do,” says Gagnon. “We focus on

And fourth “It is so important to focus

identifying what we can improve from

on the infrastructure,” says Sansalone.

a business perspective and how we

“It’s vital to have an infrastructure which

can solve it together.”

will be adaptive and flexible, and allows

The third aspect involves leveraging

you to transform to deliver the services

the assets that the company has at its

and business processes needed by both

disposal. “The unique data and intel-

customers and employees. Having an

ligence that organizations have can

adaptable infrastructure that allows you

be used in order to further automate

to drive that agility in the market is abso-

or improve business, delivering greater

lutely critical.”

efficiency through business process automation and more”, outlines Gagnon.

Bell’s support goes further, with an online digital portal allowing participation 13

E X E C U T I V E P R O FILE :

Giovanni Sansalone Title: Vice President, Product Management Gio Sansalone is Vice President of Product Management of Bell Business Markets, a Canadian provider of IP-broadband, information and communications technology (ICT) services to Canadian business. He is responsible for the Business Market Product portfolio, including Network, Unified Communications, Security, Cloud and Managed Services across large, mid and government segments. Gio has launched a number of innovative products and services across networking, managed services and security including unique Cyber Threat Intelligence services leveraging the Bell Network. Gio holds a Bachelor of Computer Engineering from the University of Montreal, Canada www . b ell. ca



“ We see ourselves as being an important contributor to the cyber security community in Canada” — Dominique Gagnon, GM, Cyber Security Practice at Bell

in the end-to-end orchestration and delivery of services that customers require. “We have a strong portfolio of professional services that can help with advising clients on their journey, mapping out their processes, and then helping them support the implementation of those changes through the integration of technology and business processes,” Sansalone explains.

BELL’S CYBER SECURITY STRATEGY – A FIVE PILLAR APPROACH When it comes to cyber security, Bell

Bell Canada – Bell’s Security Model CLICK TO WATCH

|

4:15

www . b ell. ca

15


BELL

16


“ We provide services around what is foundational in security” — Dominique Gagnon, GM, Cyber Security Practice at Bell

has implemented a strategy with its clients based on five pillars that reflect the key challenges organizations are facing. “First we provide services around what is foundational in security – the existing controls that our clients have in place,” says Gagnon. “We help them make sense of, and can bring more efficiency to, those controls. As an example, we’re working with FireEye technology to allow validation of controls within an environment and simplify the traditional approach to managing security. The overall objective is to reduce complexity in existing environments, making better use of investments while improving the security posture. www . b ell. ca

17


ENGINEERED FOR

ACCELERATED SECURITY It's time to deliver next-generation Security Information and Event Monitoring (SIEM). Legacy SIEM tools just won't deliver what our customers expect and need, so we are partnering with Bell to provide FortiSIEM, a multivendor solution that provides visibility, correlation, automated response, and remediation in a single, scalable solution. FortiSIEM helps reduce the complexity of managing network and security operations, free up resources, and improve breach detection. Worldwide, more than 80% of breaches go undetected because of a skills shortage and an overwhelming amount of event information "noise." FortiSIEM provides cross-correlation, and applies machine learning and UEBA to improve response—reducing noise, making alerts meaningful, and stopping breaches before they occur.

Get started with us at https://www.fortinet.com


Bell Canada – Overview of Bell CLICK TO WATCH

|

1:15

19

The second pillar of strategy is

The third pillar of Bell’s strategy is

around next-generation security

around detection and response. “We

information and event monitoring

partnered with FireEye to launch our

(SIEM). “Our clients tell us that they

Bell Managed Threat Detection and

are not seeing the value of their legacy

Response platform, bringing best-in-

SIEM tools as they are not providing

class detection capability, coupled

the security alerts expected,” says

with a world-class incident response

Gagnon. “We partner with Fortinet

team to our clients.”

to provide the entire automated and

The fourth pillar is around cloud

orchestrated SIEM technology. This

security. “We work with best-in-class

will improve the visibility and response

partners such as Akamai, whose high

to security incidents, and bring a

performance distributed infrastruc-

best-in-breed and next-generation

ture allows us to enhance security for

platform to the market.”

our customers,” offers Gagnon. “We www . b ell. ca


BELL

20

“ We’re transforming at the heart of our network infrastructure, and virtualising the network” — Giovanni Sansalone, Vice President Product Management at Bell

The fifth pillar involves dealing with the increase in data due to the introduction of 5G technologies. While this is still an emerging area, careful consid-

also partner with Cisco, FireEye and

eration and planning will be required

Zscaler to bring a wide range of cloud

moving forward to ensure organiza-

based security offerings.”

tions can securely adapt.


1880

Year founded

$23.96bn+ Revenue in CAD dollars

52,100 Number of employees

Gagnon and Sansalone are con-

21

why we are the only communica-

fident that their innovations and

tions provider recognized by the IDC

strategies cement Bell’s position as

Marketscape as a Canadian leader

a leader in cyber security and digital

in security four years in a row.”

transformation. “We see ourselves as being an important contributor to the cyber security community in the field,” Gagnon says. “We have over 400 security professionals across Canada supporting three operation centres, and we partner with the leading technology companies in Canada. That’s www . b ell. ca


BELL 1 CARREFOUR ALEXANDERGRAHAM-BELL BUILDING A 4TH FLOOR VERDUN QUÉBEC CANADA T +1-888-932-6666

www.bell.ca

P0WERED BY


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.