Dell Connected Security Solutions Simplify unify Trends force

  • Slides: 15
Download presentation
Dell Connected Security Solutions Simplify & unify

Dell Connected Security Solutions Simplify & unify

Trends force changes in the way you do business. A changing IT landscape =

Trends force changes in the way you do business. A changing IT landscape = security challenges = RISK TRENDS BYOD Virtualization & new technologies 2 Confidential Advanced persistent threats, breaches, attacks, malware Cloud Explosive data growth SECURITY CHALLENGES Patchwork of vendor solutions => disjointed & siloed $ Limited budget and expertise Insufficient visibility and counter measures Compliance Time & complexity of management & reporting Dell Software

It’s all about the data 3 Confidential Global Marketing

It’s all about the data 3 Confidential Global Marketing

35 Volume of Dell Software data stored Zettabytes 0. 8 2009 2020 $6. 5

35 Volume of Dell Software data stored Zettabytes 0. 8 2009 2020 $6. 5 B Estimated cost to US businesses from data breaches in 2011, (Online Trust Alliance) $5. 5 M Average cost of a data breach in 2011, (Ponemon Institute) 100, 000 19% New malware samples discovered by researchers every day. (Georgia Tech) New malware samples detected by Antivirus solutions, (Cyveillance) 7, 000+ New vulnerabilities tracked in 2011 by the Counter Threat Unit 4 Confidential Dell Software

Data is your competitive advantage It must be protected to maintain business continuity What

Data is your competitive advantage It must be protected to maintain business continuity What if a single solution could help you: • Respond quickly to security threats and problems before they negatively impact the business? • Protect every part of the infrastructure – inside and outside the network reducing the number of vendors and disparate solutions and gaining efficiencies by reducing costs? • Provide common-sense reporting that spans across areas of the network and infrastructure, helping to reduce the risk of errors from missed problems or threats, and saving time? • Unify the patchwork of processes, reducing the complexity of meeting security and compliance objectives? 5 Confidential Dell Software –

Dell simplifies & unifies security Connected Security Solutions from Dell reduce risk and help

Dell simplifies & unifies security Connected Security Solutions from Dell reduce risk and help you achieve a simpler, more unified approach to securing critical data and achieving compliance by providing common-sense reporting, unifying threat mitigation and ensuring fast response. Comprehensive coverage 6 Simpler, more unified Enable users (and the business) Inside-out, outside-in protection Gather, analyze, inform and act Confidently embrace BYOD and the cloud Built around the pillars of Embed, Detect, Protect and Respond, secure data from the device, to the datacenter, to the cloud. Realize a simpler approach to security, and enable a unified view of security with integrated, industry-leading “best of breed” solutions. Ensure the secure, compliant use of mobile technologies and the cloud by providing the right access to the right applications regardless of the device. Confidential Dell Software

Connected Security: Outside-in and inside-out protection, from device to datacenter to cloud Dell Sonic.

Connected Security: Outside-in and inside-out protection, from device to datacenter to cloud Dell Sonic. WALL Detect Network and mitigate Next Gen security risks. Firewall before Secure Remote Access they impact your Email environment Data & Endpoints Embed security Data Protection into devices & and solutions Encryption with integrated security Dell Data Protection & Encryption Dell KACE 7 7 Confidential Dell Quest One Identity Solutions Protect Identity sensitive information Access Governance with user controls Privilegedaccess Acct Mgmt Identity Administration User Activity Monitoring Security Services Respond to breaches Incident Response with quarantine. Security Managed and Svcs remediation Security & Risk Consult Dell Secure. Works or local Partner Dell Software

Identity and access managementfor the real world 8 Confidential Protect critical data with user

Identity and access managementfor the real world 8 Confidential Protect critical data with user access controls Access Governance Control & audit superuser access Privileged Account Management Manage the entire lifecycle of identities Identity Administration Monitor user activity & system access; respond to internal threats User Activity Monitoring Dell Software

Network securitywithout sacrificing performance or productivity 9 Network Security Detect threats & protect the

Network securitywithout sacrificing performance or productivity 9 Network Security Detect threats & protect the network with nextgen firewalls & unified threat management Secure Remote Access Enable SSL VPN access from virtually any endpoint Email & Web Security Protect against viruses, zombies, spam, phishing & other attacks with multiple threat detection techniques Dell Software Confidential 9

Endpoint securityto protect data and enable users 10 Confidential Protect critical data from spyware,

Endpoint securityto protect data and enable users 10 Confidential Protect critical data from spyware, spam and viruses Endpoint Security Centralize control of endpoints Endpoint Management & Compliance Protect data wherever it rests with encryption Endpoint Encryption & Data Protection Dell Software

Security servicesdetect, protect and respond to emerging threats 24 x 7 x 365 Managed

Security servicesdetect, protect and respond to emerging threats 24 x 7 x 365 Managed Security Services Protect the network, safeguarding the perimeter, critical internal assets, data, remote users, customers and partners Security & Risk Consulting Enhance security posture, reduce risk , facilitate compliance and improve operational efficiency Incident Response Provide rapid containment and eradication of threats, minimizing the duration and impact of a security breach Counter Threat Unit Identify emerging threats, develop countermeasures against new malware and exploits, and protect customers 11 Dell Software Confidential 11

Connected Securityenables organizations to securely embrace BYOD Dell Sonic. WALL • Enable secure remote

Connected Securityenables organizations to securely embrace BYOD Dell Sonic. WALL • Enable secure remote access through SSL VPN • Preserve performance with application intelligence • Manage the device (patch, config, remote lock) • Encrypt data wherever it goes Dell KACE Dell Data Protection & Encryption 12 Confidential Dell Quest One Identity Solutions Establish and enforce access rights – data, resources and roles Access Application Device Dell Software

Connected Securityenables organizations to confidently adopt the cloud Dell Sonic. WALL • Secure the

Connected Securityenables organizations to confidently adopt the cloud Dell Sonic. WALL • Secure the data center housing the cloud • Enable secure remote access through the cloud from anywhere • Improve email security through the cloud Encrypt and decrypt data stored and shared in public cloud storage services Dell KACE Dell Data Protection & Encryption 13 Confidential Dell Quest One Identity Solutions • Establish and enforce access rights – data, resources and roles • Provide SSO for cloudbased apps • Control use of privileged credentials • Managed security services • Assessments, testing and auditing Dell Secure. Works or local Partner Dell Software

Dell Software solutions • • Client management Performance management Virtualization & cloud mgmt Windows

Dell Software solutions • • Client management Performance management Virtualization & cloud mgmt Windows server mgmt • • Database management Business intelligence/analytics Application & data integration Big data analytics Security • • 14 Confidential Mobile workforce management Information management Data center & cloud management Identity & access management Network security Endpoint security Email security • • Mobile device mgmt Desktop virtualization Application/data access Secure remote access Data protection • • Enterprise backup/recovery Virtual protection Application protection Disaster recovery Dell Software

Thank you

Thank you