dell connected security solutions
DESCRIPTION
Dell Connected Security Solutions. Simplify & unify. Trends force changes in the way you do business. A changing IT landscape = security challenges = RISK . SECURITY CHALLENGES. TRENDS. Advanced persistent threats, breaches, attacks, malware. - PowerPoint PPT PresentationTRANSCRIPT
Dell Connected Security SolutionsSimplify & unify
2 Confidential Dell Software
Trends force changes in the way you do business. A changing IT landscape = security challenges = RISK TRENDS SECURITY
CHALLENGES
CloudBYOD
Virtualization &new technologies
Patchwork of vendor solutions =>
disjointed & siloed
Explosive data growth $Limited budget and
expertiseTime & complexity of
management & reporting
Insufficient visibility and counter measures
Compliance
Advanced persistent threats, breaches, attacks, malware
3 Confidential Global Marketing
It’s all about the data
4 Confidential Dell Software
Dell Software
2009 2020
Volume of data storedZettabytes0.8
35
Estimated cost to US businesses from data
breaches in 2011, (Online Trust Alliance)
$6.5B $5.5MAverage cost of a data
breach in 2011, (Ponemon Institute)
New malware samples discovered by researchers every day. (Georgia Tech)
100,000New malware samples detected by Antivirus solutions, (Cyveillance)
19%
7,000+New vulnerabilities tracked in 2011 by the Counter Threat Unit
5 Confidential Dell Software
Data is your competitive advantageIt must be protected to maintain business continuityWhat if a single solution could help you:• Respond quickly to security threats and problems before they
negatively impact the business?• Protect every part of the infrastructure – inside and outside the
network –reducing the number of vendors and disparate solutions and gaining efficiencies by reducing costs?
• Provide common-sense reporting that spans across areas of the network and infrastructure, helping to reduce the risk of errors from missed problems or threats, and saving time?
• Unify the patchwork of processes, reducing the complexity of meeting security and compliance objectives?
6 Confidential Dell Software
Dell simplifies & unifies securityConnected SecuritySolutions from Dell reduce risk and help you achieve a simpler, more unified approach to securing critical data and achieving compliance by providing common-sense reporting, unifying threat mitigation and ensuring fast response.
Comprehensive coverage
Enable users (and the business)Simpler, more unified
Inside-out, outside-in protection
Built around the pillars of Embed, Detect, Protect and Respond, secure data from the device, to the datacenter, to the cloud.
Gather, analyze, inform and act
Realize a simpler approach to security, and enable a unified view of security with integrated, industry-leading “best of breed” solutions.
Confidently embrace BYOD and the cloud
Ensure the secure, compliant use of mobile technologies and the cloud by providing the right access to the right applications regardless of the device.
7 Confidential Dell Software7
Protect sensitive information with user access controls
Respond to breaches with quarantine and remediation
Embed security into devices
and solutions with integrated security
Detect and mitigate
security risks beforethey impact your
environment
Connected Security: Outside-in and inside-out protection, from device to datacenter to cloud
IdentityAccess GovernancePrivileged Acct MgmtIdentity AdministrationUser Activity Monitoring
Security ServicesIncident ResponseManaged Security SvcsSecurity & Risk Consult
Data & EndpointsData Protection &
Encryption
NetworkNext Gen Firewall
Secure Remote AccessEmail
Dell Quest One Identity Solutions
Dell SecureWorksor local Partner
Dell Data Protection & EncryptionDell KACE
Dell SonicWALL
8 Confidential Dell Software
Identity and access management for the real world
Protect critical data with user access controls Access Governance
Control & audit superuser access Privileged Account Management
Manage the entire lifecycle of identities Identity Administration
Monitor user activity & system access; respond tointernal threats User Activity Monitoring
9 Confidential Dell Software9
Network security without sacrificing performance or productivity
Detect threats & protect the network with next-gen firewalls & unified threat management
Network Security
Enable SSL VPN access from virtually any endpointSecure Remote Access
Protect against viruses, zombies, spam, phishing & other attacks with multiple threat detection techniques
Email & Web Security
10 Confidential Dell Software
Endpoint security to protect data and enable users
Protect critical data from spyware, spam and virusesEndpoint Security
Centralize control of endpoints Endpoint Management & Compliance
Protect data wherever it rests with encryption Endpoint Encryption & Data Protection
11 Confidential Dell Software11
Security services detect, protect and respond to emerging threats 24x7x365
Protect the network, safeguarding the perimeter, critical internal assets, data, remote users, customers and partners
Managed Security Services
Enhance security posture, reduce risk, facilitate compliance and improve operational efficiency
Security & Risk Consulting
Provide rapid containment and eradication of threats, minimizing the duration and impact of a security breach
Incident Response
Identify emerging threats, develop countermeasures against new malware and exploits, and protect customers
Counter Threat Unit
12 Confidential Dell Software
Connected Security enables organizations to securely embrace BYOD
Establish and enforce access rights – data, resources and roles
• Manage the device(patch, config, remotelock)
• Encrypt data whereverit goes
• Enable secure remote access through SSL VPN
• Preserve performance with application intelligence
Dell Quest One Identity Solutions
Dell KACEDell Data Protection
& Encryption
Dell SonicWALL
AccessApplicationDevice
13 Confidential Dell Software
Connected Security enables organizations to confidently adopt the cloud
Dell SecureWorksor local Partner
Dell SonicWALL
• Establish and enforce access rights – data, resources and roles
• Provide SSO for cloud-based apps
• Control use of privil-eged credentials
Dell Quest One Identity Solutions
• Secure the data centerhousing the cloud
• Enable secure remote access through the cloud from anywhere
• Improve email securitythrough the cloud
Encrypt and decryptdata stored and sharedin public cloud storageservices
Dell KACEDell Data Protection
& Encryption
• Managed security services
• Assessments, testing and auditing
14 Confidential Dell Software
Dell Software solutions
Data center & cloud management
• Client management• Performance
management• Virtualization & cloud
mgmt• Windows server mgmt
• Mobile device mgmt• Desktop virtualization• Application/data access• Secure remote access
Information management
• Database management• Business
intelligence/analytics• Application & data
integration• Big data analytics
Mobile workforce management
• Identity & access management
• Network security• Endpoint security• Email security
Security Data protection• Enterprise backup/recovery• Virtual protection• Application protection• Disaster recovery
Thank you