3 Pillars of Digital Transformation 10th November Presentations

Page 1

3 Pillars of Digital Transformation Event - Private Sector 10th November 2022
Craig

About Stone Group

• Originally founded in 1991 as an Original Equipment Manufacturer building our own Stone branded Laptops, PCs and Servers for the Education sector

• Stone are the only UK based IT manufacturer with its own 100,000sq.ft recycling facility, ADISA and Government accredited based out of our main office located just off M6 Junction 13 Stafford

• 500+ Employees

www.stonegroup.co.uk
Fast Facts • £140m OEM Manufacturer & Value-Added Reseller based in Stafford • One of the UK’s fastest-growing VARs • OEM system builder – Stone-branded product – 120,000 devices per year • 500-staff single site operation • Customer Service ethos • Market-Leading Value Added Proposition • Multi-award winning Reseller, and ITAD provider • Staffordshire Business Of The Year & CRN Best Company To Work For 2021 (£101m-plus) • Strong, robust partnerships with key vendors (Microsoft, Senso, Acer, Asus, Dynabook, Cisco Meraki) • Forecast £150m Turnover for 2022 • In-house Support Desks – break-fix, expertise, consultancy

Endpoint Isolation Introduction and Value

The endpoint PC is the key security battleground

It’s where people, data and the internet meet
That makes it the focus for cyber-attackers using social engineering
• Phishing • Ransomware • Therefore, organizations must prioritize defending their endpoints
HP CONFIDENTIAL SHARED UNDER NDA © Copyright 2021 Hewlett Packard Development Company, L.P. The information contained herein is subject to change without notice 7 Sure Start Sure Run Sure Admin Sure Recover Tamper Lock Sure Sense Sure Access Below the OS In and Above the OS Protection against BIOS Rootkits like Sednit LoJax Protection against Unauthorized Firmware Configuration Changes Recovery from Destructive Wiper attacks such as​ NotPetya, Shamoon Application Persistence against AV deactivation attacks like H1N1 Secure privileged assets from OS malware like Remote Access Toolkits Protection against malicious executables like​ CryptoLocker, TrickBot Protection against physical intrusion attacks like Evil Maid ATTACKS PROTECTED Protect user passwords from Credential Phishing attacks Credential Protection Sure Click Threat Containment for web or email borne malware like​ Emotet, Dridex

Organizations

two
• Next-Gen Anti-Virus (or “Endpoint Protection Platforms”/EPP) • Good at stopping known attacks • Endpoint Detection & Response (EDR) • Good at providing visibility about new threats, or variants of existing threats Clearly NGAV and EDR aren’t enough –attacks still get through every day
usually rely on
endpoint security products
HP CONFIDENTIAL. © 2021 HP Development
EPP AV/NGAV Visibility EDR/MDR/XDR Microsoft ATP Crowd Strike Vmware Carbon Black Containment & Isolation HP Sure Click Enterprise Z-Scaler MENLO Hysolate HP Sure Access Enterprise MS Defender, McAfee, Broadcom, Sophos, TrendMicro Tanium ENTERPRISE ENDPOINT SECURITY CONTROLS BUILDING A DEFENCE IN DEPTH STRATEGY AND IMPLEMENTING A ZERO TRUST Cylance
Company, L.P. The information contained herein is subject to change without notice.
Endpoint Isolation fills the endpoint security gap, stopping what NGAV and EDR miss. Provides inherent protection from malware and threats
Isolation fills the gap between NGAV and EDR
Provides inherent protection from known and unknown malware and other threats
Lowers security operational overhead
Provides seamless user experience
Endpoint

Endpoint Isolation Technology and Key Benefits

Endpoint Isolation – Advanced Protection Technology Endpoint software that virtualizes individual tasks Micro-virtual machine destroyed when task completes, eliminating any malware that may have been present Each high-risk task is isolated inside a “micro-virtual machine” • Email attachments • Office documents • Browsing • USB drive files

Inherent protection

Benefits of Endpoint Isolation

ZERO TRUST: Runs everything from untrusted sources in an isolated space on the endpoint
Protection
Doesn’t rely on detecting anything: “inherently protects”, including against zero-day attacks Protects against attacks from both “corporate” and “personal” vectors

Ransomware example

Endpoint Isolation in Action

Protection
Ransomware encrypts files within µVM. Blocked from Intranet. Introspection records malware activity. User closes task. No remediation necessary. Delivered via email; opened in µVM.
”Safe space” for observation allows for introspection
of Endpoint Isolation Realistic environment provides superior threat intelligence Cloud analytics provides historical analysis
Visibility Benefits
Visibility

Security

Endpoint
Efficiency Benefits of
Isolation
(urgent) Support Tickets
SecOps isn’t just a matter of minimizing the number of tools; what counts are the processes associated with those tools
false positives (inherent protection)
endpoint remediation (because we stopped attacks from dropping payload or propagating)
Security efficiency Fewer
Efficient
Fewer
Less
User experience Benefits of Endpoint Isolation User Experience No changes to user workflow Users operate as normal No remediation work Inherent protection lowers need to remediate endpoints Work with confidence Users less concerned about “infecting the whole place” Hardware assist Endpoint performance maintained

Endpoint Isolation Product Portfolio

Wolf Pro Security

Click Enterprise

Isolation Security for any Organization PC Pre-installed Software
Endpoint Isolation Product Portfolio World-Class
Sure
Software only (HP and Non HP PCs)
Enterprise class Threat Containment through EI and Credential Protection
Rich policy configuration and situational awareness
Cloud or on premises management
available
For enterprises, government, and any security-mature organization Edition PCs
on select HP Pro, Elite & Z PCs Software only (HP and Non HP PCs)
Complete endpoint security suite
Threat Containment via Isolation, Credential Protection, Optional NGAV (EPP)
Simple, cloud based management
Optimized for limited security expertise

*: 25 device minimum. SCE supports on premises Wolf Controller option **: Minimum purchase required

purchased, includes a paid 1 year or 3 year license. The HP Wolf Pro Security Edition software is licensed under the

terms of the HP Wolf

license Agreement (EULA) that can be found at: https://____________ as that EULA is modified by the following: “7. Term. Unless otherwise terminated earlier pursuant to the terms contained in this EULA, the license for the HP Wolf Pro Security Edition (HP Sure Sense Pro and HP Sure Click Pro)

will continue for either a twelve (12) month or thirty six (36) month license term (“Initial Term”). At the end of the Initial Term, you may either (a) purchase a renewal license for the HP Wolf Pro Security Edition from HP.com, HP Sales or an HP Channel Partner, or (b) continue using the standard versions of HP Sure Click and HP Sure Sense at no additional cost with no future software updates or HP Support.” 3. HP Wolf Pro Security Service is sold separately. HP services are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service, or the HP Limited Warranty provided with your HP Product. For full system requirements, please visit www.hpdaas.com/requirements. 4. HP Wolf Enterprise Security is an optional service and may include offerings such as HP Sure Click Enterprise and HP Sure Access Enterprise. HP Sure Click Enterprise requires Windows 10 and Microsoft Internet Explorer, Google Chrome, Chromium or Firefox are supported. Supported attachments include Microsoft Office (Word, Excel, PowerPoint) and PDF files, when Microsoft Office or Adobe Acrobat are installed. HP Sure Access Enterprise requires Windows 10 Pro or Enterprise. HP services are governed by the applicable HP terms and conditions of service provided or indicated to Customer at the time of purchase. Customer may have additional statutory rights according to applicable local laws, and such rights are not in any way affected by the HP terms and conditions of service, or the HP Limited Warranty provided with your HP Product.

CAPABILITIES WOLF PRO SECURITY SURE CLICK ENTERPRISE Hardware Enforced Threat Containment Credential Protection Malware Prevention NGAV (optional) Customer Choice Cloud Based Wolf Controller (Management Console)* Simplified Advanced Advanced Policy Configuration Onboarding Service Partner Provided ** HP Wolf Security – Summary of Capabilities
product data sheet for details.
Edition (including
Pro and
SKUs
1. HP Security is now HP Wolf Security. Security features vary by platform, please see
2. HP Wolf Pro Security
HP Sure Click
HP Sure Sense Pro) is available preloaded on select
and, depending on the HP product
license
Security Software End User
is effective upon activation and
Summary Protection Visibility Security Efficiency User Experience Compliance & Audit Thank ! • The PC endpoint is the key security battleground • Operational efficiency is a crucial consideration for endpoint security • EDR and EPP solutions are not enough – attacks still get through Background Endpoint Isolation • Uses per-task micro-virtual machines to isolate and contain malware • Fills the endpoint security gap, stopping what NGAV and EDR miss Endpoint Isolation delivers unique value across five key dimensions
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public
Peter Jones, CISSP, CISM, CIEH SASE Specialist
November 2022 SASE Your Way.

The future is evolving…fast.

of companies believe that their current business models will be economically viable through 2023 ONLY
11%
Source: The new digital edge: Rethinking strategy for the postpandemic era, McKinsey, May 2021

Hybrid work is transforming the way your organization operates

of CIOs say it’s important to empower a distributed workforce with seamless access to applications and consider high-quality collaborative experiences top of mind 85%

Source:
Accelerating Digital Agility Research (CIO Data) Cisco, 2021

Applications are hyper-distributed across a diverse IT landscape

of CIOs say it’s important to maintain security, control, and governance across user devices, networks, clouds, and applications 85%

69% of CIOs believe insights will be more important than ever to deliver a seamless consumer experience

Accelerating Digital Agility Research (CIO Data) Cisco, 2021

Source:
Hybrid work Applications The traditional networking model is inadequate The traditional networking model is inadequate SaaS IaaS Private cloud Internet Bottle neck MPLS VPN Internal 20% Internet 80% Traffic Changes in traffic patterns are creating bottlenecks and performance challenges Problems • App performance • User experience • Security efficacy • # of tools / vendors • Integrations

Are you ready in the Networkmiddle?transformation is needed

A transition to a cloud enabled topology

SASE

is

Hybrid work Applications

an approach and a cohesive long-term strategy to address these challenges

Cisco has a strong vision to deliver a fully integrated SASE solution, as well as the financial resources to execute the vision.

Gartner MQ report for WAN Edge Infrastructure, September 2021

Network transformation

© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public
a DC-centric
DC-centric MPLS VPN Cloud-Enabled S A S E Perimeter security appliances to protect network Internet Private Apps Internet SaaS
Transition from
topology to one that’s cloud ready

Major SASE use cases

Secure remote worker

• Seamless connection to apps and data anywhere users work

• Secure access to internet and cloud apps

• Authenticate users and ensure device health before establishing connection

Internet/ SaaS/ IaaS

Secure Access Service Edge

Secure edge

• Streamline connectivity to public and private apps across all office locations

SD-WAN fabric

• Provision SD-WAN fabric across thousands of users and locations

• Secure access to apps and direct internet access

Remote worker Campus/Branch, colocation and hosted data centers

© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public

SASE

End-to-end visibility

SASE Consumer

SD-WAN

Middle Mile

Security

Reduce cost

Improve OpEx with circuit consolidation and consolidation of UI touchpoints

© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public

© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public

Improve user experience

Bring services closer to user and leverage middle mile partnerships + password-less authentication to optimize connections

Minimize risk

Decryption & inspection addressing data loss, leveraging a true zero-trust approach across the IT perimeter

Cisco
Internet SaaS IaaS Provider
Private DC

Cisco SASE - Detail

Consumer

Branch / HQ

Network

Segmentation

End-to-end visibility

SASE

Provider

Secure Remote Worker

VPN-less Client VPN

Reduce cost

• Improve OpEx through circuit consolidation

• Reduce IT complexity and improve OpEx by consolidating UI touchpoints and leveraging centralized policy

© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public

© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public

Application Aware Routing Application Visibility

Device Posture Health

Hierarchical Topologies App to App

Multi-cloud Access

SD-WAN Optimization Middle Mile

Security

DNS security NGFW

CASB / DLP

Remote Browser Isolation Secure Web Gateway

Improve user experience

• Leverage password-less authentication measures to streamline workflows

• Leverage Cisco® SD WAN + middle mile partnership to optimize connections and reduce latency

Minimize risk

Private DC IaaS

Internet SaaS

• Proxy based architecture decrypts, inspects, and assists with data loss prevention to protect brand

• Leverage a true zero-trust approach by securing workplace and offpremises workforce to workloads

Cisco SASE Architecture

© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public

End-to-end visibility

Internet SaaS Private DC IaaS Provider SASE Consumer Branch / HQ Secure Remote Worker CASB / DLP Device Posture Health DNS security NGFW Remote Browser Isolation Secure Web Gateway Application Aware Routing Application Visibility Segmentation Multi-cloud Access Hierarchical Topologies App to App ZTNA Client VPN Network Security Service Edge SD-WAN Optimization Middle Mile Is it the WiFi? Is it the home network? Is it the SECaaS? Is it SD-WAN underlay? Is it the transit ISP? Is it the SaaS app? Is it the Application? Is it the ISP? Is it SD-WAN overlay?

Journey to SASE from DC-centric Topology

An example outcome of a joint session

© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public
DC-centric topology Move to SD-WAN and DIA Private DC to cloud-enabled and consolidating services Wrap in Zero-Trust Branch Campus INET SaaS IaaS Private DC Internet MPLS Remote User VPN Branch Campus SaaS IaaS Private DC Remote User VPN SD WAN INET MPLS LTE DIA Branch Campus Remote User SD WAN SASE Middle Mile optimization SD-WAN Security INET SaaS IaaS Branch Campus Remote User SD WAN Middle Mile optimization SD-WAN Security SASE Workload Workplace Workforce Zero Trust INET SaaS IaaS

Cisco SASE Offers

Cisco + Secure Connect SASE a la Carte

Build-your-own approach

© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public

Unified solution with converged UI and turnkey service

© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Public At Cisco, we’re uniquely positioned to help Largest SD-WAN solution provider Leader in Zero Trust two years running Defending 100% of the Fortune 100 Networking Security Observability Cloud Computing 2021 Product of the Year Largest collective view of internet and cloud networks WAN Edge Magic Quadrant Leader 2021

CHG-MERIDIAN FINANCIAL SOLUTIONS

Efficient Technology Management®

Technology Areas

Efficient Technology Management®
46
Efficient Technology Management® CORPORATE FIGURES The CHG-MERIDIAN Group in numbers: 2021 47 79% Information Technology Volume of lease origination broken down by technology sector 17% Industrial Technology 4% Healthcare Technology countries 29 nearly 1,200 employees Total technology portfolio financed and managed as at Dec 31, 2021 €7.8 billion Volume of lease origination as at Dec 31, 2021 1.727 billion
Lifecycle Management

TESMA®

Efficient Technology Management® 49
Efficient Technology Management® IT Project Allocation 50 70% 20% 20% 20% 10% 20% 20% 5% 10% 60% 20% 40% 75% 10% 20% 40% 40% 0% 20% 40% 60% 80% 100% Scoping Launch Initial Phase Useful Life End-of-Life Personnel Services Software Hardware

Taking care of the lifecycle

Efficient Technology Management®
51
Systems & Processes from start to finish Data management and analysis End-of-life/Refresh lowering total costs.
Efficient Technology Management® Total Cost of Ownership (TCO) 52 Tangible Costs Time Environmental Concerns Total Cost of Ownership 3. Environmental Concerns • Home vs Office • Partner Selection • Carbon Reporting 1. Tangible Costs • Hardware/Software • Maintenance/Support • Shipping & Taxes 2. Time • Internal vs External • All lifecycle stages • Scalability

Cost Reduction

53
Efficient Technology Management® Full absorption of project costs 54 = Something-as-a-Service Manufacturer & Supplier Contracts Implementation/Ongoing Services Hardware/Software Costs
Efficient Technology Management®
Process & System Integrations
Fixed costs throughout the lifecycle
Scalability Matrix
Asset Tracking
Useful Life Management
Refresh & Replace Repeatable Solutions 55 A connected network of platforms live & nimble
• Manufacturer solutions & tools • Supplier solutions & tools • Internal ITSM/accounting systems • Multi-party processes • Project management Portfolio Management Automation reduces the workload

Simple reporting and analysis of previous, existing and future IT estates

Efficient Technology Management® Auditing 03 Secondary Life 58 Collection 01 Erasure 02 Remarketing 04
Efficient Technology Management® Sustainable Lifecycle Thinking 60 1 Responsible Procurement 2 Eco-friendly distribution 6 Remarketing 3 Customer use 4 Data erasure 5 Refurbishment 7 Reuse carbonZER0 Technology asset management Lifecycle extension and waste reduction

Here's how it works

Efficient Technology Management®
61

Certified calculation

The calculation of CO2 emissions covers all greenhouse gases generated throughout the lifecycle of your IT devices, from manufacture and transport to use phase and end-of-life phase.

Certified climate change mitigation projects

Through carbonZER0, you are supporting internationally recognized and certified climate change mitigation projects based on the UN's 17 sustainable development goals.

Certificates

Low offset payments

The payments for offsetting carbon emissions increase your monthly lease instalment by just a few cents.

You receive an internationally recognized certificate as proof of the CO₂ emissions saved.

62

Certified climate change mitigation projects

DRINKING WATER in Kono, Sierra Leone WINDENERGY in Ovalle, Chile

MICROCREDITS in India

Efficient Technology Management®
63
64
asset
Flexible management; straightforward financial control and reporting Manage and allocate costs based on where they are incurred; internationally, departmentally, individually
technical and commercial asset data
Every stage of the
lifecycle
Full Transparency Combining

Improvement Strategies

66
Self-Service Platforms Asset & Portfolio Management Digital Planning Multi-Vendor Integration
Efficient Technology Management®
Landscape 68 Precise Forecasting Cost & Process Analysis Circular Economy Partner Processes Repeatable
Future

Software Review Meetings

Review Meetings

Overview
Software
Purpose Line of Business Back Up Security
Line of Business Microsoft, Google or Both M365 Business Basic M365 Business Standard M365 Business Premium Office365 E1 Office365 E3 EMS E3 Azure Active Directory Plan 1 Intune
Microsoft Business Plans M365 Business Basic M365 Business Standard M365 Business Premium Sub Users 300
Office 365 E3 / E5 Office E3 Office E5 Step-up No License restriction (Min 1)
Microsoft 365 E3 / E5 Cloud Suite Office 365 Enterprise Mobility & Security Suite Windows Operating System Defender for Endpoint Microsoft Defender for Office 365 Power BI
Backup Microsoft do NOT Back up your data Cloud to Cloud / On-Prem BackUp Vendors : Barracuda Redstor Veeam Azure BackUp Many More
Security Microsoft Defender for Endpoints / O365 Device & Data Vendors: Watchguard Sophos Sonicwall McAfee Many More

Thank You.

Sustainability and E - Waste: Our Journey Craig

Campion

IT Asset Disposal – A Global Challenge

• Unwanted or surplus PCs, printers, networking, communications and telecoms equipment plus other electronic devices is collectively known as e - waste.

• In 2019, the Global E - Waste Monitor reported that out of 53.6m metric tonnes of e - waste produced worldwide, 82% of it was sent to landfill, incinerated or illegally traded.

• The world collectively is increasing the total e-waste figure by approximately 4% every single year.

www.stonegroup.co.uk
www.stonegroup.co.uk IT Asset Disposal – UK e - Waste Facts & Value 1.5 tonnes of WATER 21kg of CHEMICALS 240kg of FOSSIL FUELS The production of a single computer and monitor uses at least…
www.stonegroup.co.uk IT Asset Disposal – A National Challenge 23.9kg of e - waste Per Person £370m lost each year in valuable raw materials 500,000 tonnes unaccounted e - waste 31m laptops currently hoarded Global Waste Monitor Report Lancaster University Anthesis Report & Lancaster University Lancaster University
Protect The Planet and… PROTECT OUR CHILDREN AND OUR ENVIRONMENT
Choosing the Right E - Waste Partner Free Collections Fully Accredited Secure Data Destruction Complete Traceability Cash Rebates Peace of Mind Own Onsite Facility

Stone 360 Demo

Craig Campion

Stone 360
Stone 360 Statistics Since Launch 10,000 downloads (both iOS/Android) 4,100 registered users (200 per month) 4 million head count from registered customers 940,000 units collected 5,000 trees planted (est. 60 tonnes of CO2 reduced). 88% ITAD conversion for registered customers
Constant Innovation 1. New Partnership - Ecologi 2. Major UI/UX enhancements (Woodland seasons, dark mode) 3. Edit a collection feature 4. In-App Messaging 5. Site location enhancements (Geo-location) 6. Driver location tracking 7. Welcome screen & on-boarding 8. In-App documentation & signatures

Thank You

Making a Digital Difference

Stone Group Sustainability Framework

What does Sustainability mean to ensuring a responsible business?

Resilient balance sheet and responsible business Resilient communities (Employees, Supply chain and Customers) Resilient environment
Sustainability is a mindset that seeks to create a resilient, responsible and purpose driven business by safeguarding three vital features no business can operate successfully without:

What

Sustainability mean to ensuring a responsible business? Sustainability is a mindset that seeks to create a resilient, responsible and purpose driven business by safeguarding three vital features no business can operate successfully without: Resilient environment Resilient communities Resilient balance sheet and Responsible business Includes environmental factors such as: • Resource use • Waste • Carbon • Biodiversity • Pollution (land, air and water) Includes social factors such as: • Employment of local labour • Equality and Diversity • Supporting charities through giving and volunteering • Inclusivity • Spend with social enterprises • Employee engagement and wellbeing • Training and development • Tackling social deprivation • Local supply chain Includes commercial and ethical factors such as: • Margins • Cashflow • Operational costs including lean • ROI • Risk Management • Purpose • Ethics • Responsibility
does

Framework Structure

The “Making a digital difference” framework is split across the two focus areas of Environmental Sustainability and Social Sustainability with ten areas of activity
Environmental Circular Economy (SDG 12, Responsible Consumption/Pillar infrastructure/Repair/Reuse/Warranty) Sustainable Procurement (SDG 11, Sustainable Cities/Pillar Partnerhubs) Net Carbon/GHG Zero (SDG 13, Climate Action/ Target Net Zero 2030) Environmental Protection & biodiversity (SDG 14/15 Land and Sea) Zero Waste (SDG 15, Life on Land)

Framework Structure

The

Sustainable Solutions (SDG 9, Innovation, Pillar Networking)

Social Value (SDG 10, Reduce Inequalities)

Wellbeing and Engagement (SDG3, Good Health)

Protecting Human Rights (SDG8, Good Jobs/economic growth/security)

Closing the Digital Gap (SDG4, Quality Education)

“Making a digital difference” framework is split across the two focus areas of Environmental Sustainability and Social Sustainability with ten areas of activity Social Sustainability
Sustainability Pillars Circular Economy Carbon Reduction Sustainable Procurement Environment Protection & Biodiversity Zero Avoidable Waste We will achieve net zero carbon by 2030 We will continue with Zero to Landfill and be single use plastic free Our operations will ensure a healthy environment and increase biodiversity We deliver a circular IT Solution at every stage of Asset lifecycle We will always drive sustainability with our Supply Chain
Environmental

Social Sustainability Pillars

Sustainable Solutions

Closing the Digital Gap

Working with partners to reduce digital poverty through hardware and reduce digital divide through learning and development

Embracing innovation and providing sustainable solutions to all stakeholders

Social Value

Wellbeing and Engagement

Protecting Human Rights

Delivering Social Responsibility through our actions Measure, monitoring and delivering social value

Supporting employees and embracing inclusion and diversity

Supporting communities and individuals to ensure equality of opportunity and access

Sustainability Stages – 3 year programme Stage 1 Integrity and Inform Stage 2 Innovate and Engage Stage 3 Inspire and Lead

Stage 1 Integrity and Inform

To understand what we need to measure and where we are up to

Stage 2 – Innovate and Engage

Deliver on targets, enhance digital and sustainable offering to support all stakeholders

Stage 3 – Inspire and Lead

Provide leading solutions to support our customer’s sustainable ambitions through sustainable solutions, reducing environmental impact and increasing social value

Progress Divided across the Three Stages
Circular Economy Sustainable Solutions Carbon Reduction Social Value Sustainable Procurement Closing the Digital Gap Environment Protection & Biodiversity Protecting Human Rights
Zero Avoidable Waste Wellbeing and Engagement

Framework Principles

Stone’s Making a digital difference framework sets a common direction of travel and is made up of two parts: Environmental Sustainability and Social Sustainability. The framework is flexible and will be adapted as our business progresses through the stages and as the sustainability landscape changes and evolves. The framework is a 3 year programme with each stage required to be completed in turn Each business vertical will support the framework.

Framework governance will be managed through the Sustainability Leadership Forum

Framework KPIs How successfully we are progressing the actions Making a Digital Difference framework will be measured through a series of social value, cost and volume centred KPIs Each business vertical is to report on progress to Group SLF on a centrally held dashboard Environmental KPIS Social KPIS Net Zero Carbon – Scope 1,2,3 Social Value Generated by Client and Business Vertical (Thrive System) Zero Avoidable Waste – ITAD volume and Zero Waste to Landfill accreditation Charity donations and volunteering Cost and Volume of Water Learning and Development Environmental Incidents Employee Engagement
Stone Group Vision & Values

Our Vision

To empower our customers to improve the education, health and quality of life of people in the UK or to transform their businesses creating greater productivity and value.

Our Values

Social Value Linked to PPN06/20  Representative of Stone’s commitment to being a responsible business contributing to the wellbeing, inclusion and engagement of communities  Specific to your needs  Social Value Return and data  Reduce (Repair)– Reuse (ITAD) Stone Refurb – Recycle – Zero to Landfill Diversion from Landfill/Carbon Saved/Units recycled/Water Impact/Plastic saved/Precious Metals/Energy Saved  Employment/training/work experience/community projects/ T Levels/ school Engagement  Green spaces/mental health first aiders/volunteering/ apprentices
Social Calculator Timeline 107 By Customer by Business Vertical • Edit Master text styles • Second level • Third level • Fourth level • Fifth level

What We Do: IT Asset Lifecyle

Customers can come to us at any point in the life of technology and we can offer a solution to all needs.

Our Circular IT strategy allows us to be at the forefront of technology by providing proactive, innovative and safe ways of working.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.