dell client solutions security portfolio 2014

12
1 Dell Client Solutions Security Portfolio August 2014

Upload: dell-enterprise

Post on 20-Aug-2015

1.446 views

Category:

Services


4 download

TRANSCRIPT

Page 1: Dell Client Solutions Security Portfolio 2014

1

Dell Client Solutions Security Portfolio

August 2014

Page 2: Dell Client Solutions Security Portfolio 2014

Client Solutions Security

Market trends are increasing pressure on endpoint security

Compliance Pressures75% of organizations lack resources to meet compliance regulations. 73% say increasing audit burden is their biggest challenge.3

Evolving User Behavior200 million employees bring their own device to work.1 66% use free file-sharing platforms to share corporate data.2

Data Explosion2.5 quintillion bytes of data created every day, and end users are accessing it everywhere.4

Growing ThreatsIn just one month, 280 million malicious programs, 134 million Web-borne infections, and 24 million malicious URLs are detected.5

Endpoint Security

1. Mobile Is The New Face Of Engagement, Forrester Research, February 20122. Workforce Mobilization: What Your I.T. Department Should Know, SkyDox, June

20123. 2013 State of the Endpoint, Ponemon Institute, December 2012

4. Understanding Big Data, IBM 5. Kaspersky April 2012 Threat Report

Page 3: Dell Client Solutions Security Portfolio 2014

Client Solutions Security3

The IT balancing act

End user demands

Data protection

How do you balance end user expectations to work when and where they want, on any device with the need to protect data and meet compliance?

Page 4: Dell Client Solutions Security Portfolio 2014

Client Solutions Security

Organizations are looking for ways to:

04/18/20234

as it moves with end users

without adding IT burden

of the entire endpoint security strategy

without disruption or risk

Protect data

Meet compliance

Simplify management

Enable productivity

Page 5: Dell Client Solutions Security Portfolio 2014

Client Solutions Security5

At Dell, we believe endpoint security and compliance don’t have to be difficult or disruptive.

Dell endpoint security solutions protect data wherever it goes without sacrificing IT or end user

productivity.

Our endpoint security point of view

Page 6: Dell Client Solutions Security Portfolio 2014

Client Solutions Security6

Dell recommends: Every endpoint security strategy should include four key components

Encryption Malware Prevention

Authentication

Centralized, remote management

Ensure only authorized users have access to your data

Proactively protect users and data against daily threats

Protect data no matter where end users take it

Page 7: Dell Client Solutions Security Portfolio 2014

Client Solutions Security7

Encryption Malware Prevention

Authentication

Centralized, remote management

Ensure only authorized users have access to your data

Proactively protect users and data against daily threats

Protect data no matter where end users take it

Dell Data Protection portfolioOnly Dell offers a complete portfolio of endpoint security solutions

Dell Data Protection | Security ToolsComprehensive line-up of authentication solutions

Dell Data Protection | EncryptionA simple, comprehensive, flexible way to protect data from device to the cloud

Dell Data Protection | Protected WorkspaceA proactive approach to defeating malware and advanced persistent threats in real-time

Page 8: Dell Client Solutions Security Portfolio 2014

Client Solutions Security8

File level encryption that protects data no-matter where is goes…

…and IT maintains encryption keys and control

Dell Data Protection | EncryptionVirtually transparent to end-users

Provides end-user data protection across end-points

Single management console

Available on both Dell and non-Dell systems.

Corporate issue

PC

Personal tablet

BYOD Smartpho

ne

USB Remote

media

Publi

c Cloud

Company data File level

encryption

Page 9: Dell Client Solutions Security Portfolio 2014

Client Solutions Security

Broadest range of fully-integrated advanced authentication options, including fingerprint, smart card and contactless smart card readers and hardware credential processing.

FIPS 140-2 compliant TPM, hardware password manager for more secure credential protection and FIPS 201 compliant fingerprint reader

Consolidated management of access control and encryption policies from one console and easy deployment and integration with single sign-on for Windows Active Directory.

Advanced authentication credentials enable employees to log in once without having to memorize multiple passwords – or worse – write them down!

9

Dell authentication solutions

Flexible, secure solutions to keep unauthorized users out of your data and your business

Comprehensive protection

Easier compliance

Simplified management

End user productivity

Page 10: Dell Client Solutions Security Portfolio 2014

Client Solutions Security10

Dell Data Protection | Protected Workspace

A proactive approach to defeating malware and advanced persistent threats in real-time

Comprehensive protectionAutomatically detects and blocks all malicious behavior – even zero-day attacks that traditional AV/AM software hasn’t learned of yet.

End user productivityEnd users securely work as they always have using the tools they need, without interruption.

Easy activationShips pre-installed on Dell commercial PCs and saves IT countless hours of remediation work.

Page 11: Dell Client Solutions Security Portfolio 2014

Client Solutions Security11

Simplified central management without disruption

Save time with a single remote management console, easy deployment and seamless integration into your IT environment

Centralized, remote

management

Reduce deployment time

with auto provisioning feature available when

purchased on a Dell commercial device

Deploy 5X faster than traditional

encryption solutions, saving >3 hours per PC

Single source

for solutions and support

Remotely manageall endpoint security needs from a single

console: encryption and authentication, port control, compliance,

and cloud and mobile security

Data-centric encryption

won’t interfere with existing IT maintenance

tools, such as patch management

Page 12: Dell Client Solutions Security Portfolio 2014

12

Questions?

Contact a DDP | E Specialist directly at: [email protected]

Visit www.dell.com/dataprotection