efficiency, effectiveness, productivity: dell connected security in action
TRANSCRIPT
![Page 1: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/1.jpg)
Welcome! Delldirekte.no/DellST14
![Page 2: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/2.jpg)
Dell Solutions Tour 2014
We welcome you together with our partners!
![Page 3: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/3.jpg)
Dell Solutions Tour 2014
![Page 4: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/4.jpg)
Dell Solutions Tour 2014
![Page 5: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/5.jpg)
Dell Solutions Tour 2014
Connect with us
@DellLytter @DellDirekte
http://www.linkedin.com/company/dell
https://www.facebook.com/DellNorway
DellDirekte.no
#DellST14
Delldirekte/DellST14
![Page 6: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/6.jpg)
Dell Solutions Tour 2014
![Page 7: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/7.jpg)
The Dell Advantage
Florian Malecki
International Product Marketing Director – Dell Security
![Page 8: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/8.jpg)
The Dell Advantage Presenter name Presenter title Date
What if….
![Page 9: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/9.jpg)
Making technology more accessible Giving organizations of any size the power to do more
![Page 10: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/10.jpg)
Dell Solutions Tour 2014
Practical innovation Our Research & Development strategy
• Best-of-breed platforms
• Organic innovation • Integration across
all elements
Build
• Joint product and solution engineering and testing
• Common strategic roadmaps
Partner
• $18 billion and 20 acquisitions
• Full adherence to the Dell design philosophy
Acquire
![Page 11: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/11.jpg)
The intersection of traditional and new IT
![Page 12: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/12.jpg)
Ready for tomorrow
Optimized for today
![Page 13: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/13.jpg)
Dell Solutions Tour 2014
Standards-based No deliberate proprietary lock in
Dell is different Reach your full potential without limitations
Modern platforms No vested interest in legacy systems
End-to-end solutions No siloed viewpoint or hidden agenda
Flexible scaling No forced constraints or rip-and-replace
Modular systems No costly monolithic stacks
Open approach No intentionally closed ecosystems
![Page 14: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/14.jpg)
Dell Solutions Tour 2014
Leadership that benefits every customer Making powerful technology more accessible and affordable
Search
4 of 5 top search engines worldwide powered by Dell
Data center
#1 provider of virtualized data center infrastructure
Social
3 of 4 top social media websites are powered by Dell
Cloud
#1 provider of cloud infrastructure—over 1M servers shipped
Software
90% of Fortune 1000 companies use Dell software
Servers
#1
server provider in North America, Latin America, China
Storage
#1 provider of iSCSI storage solutions
Support
#1 in enterprise services support
![Page 15: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/15.jpg)
Let’s continue the conversation Your challenges drive our capabilities
![Page 16: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/16.jpg)
Optimized enterprise
Business-class connected solutions
Flexible, next-gen services
Value-added software
One place for end-to-end solutions
![Page 17: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/17.jpg)
Dell Security Better security, better business
![Page 18: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/18.jpg)
Dell - Restricted - Confidential
Underlying foundation of threats: Basic nature of threats is constant change
• Individual computers
• Modem
• Security
• Firewall 101
• TSRs
• Viruses
• Internet
• Worms
• Trojans
• DOS/ DDOS
• Physical again (Portable media)
1980 1990 2000 2014
Global infrastructure
Individual computers
Individual networks
Multiple networks
Regional networks
• Financial gain
• Espionage - intel gathering
• Nefarious purpose
• Competitive advantage
• Homeland security threats
• Advance Persistent Threat
• Morphing and complex threats
• AI (learn) hacking
• XSS, SQL Injection attacks
• Delivery via Web 2.0 and social networking sites
• Gov’t Healthcare Spam / Phishing
• Watering-hole attacks
• Ransomware
• System hopping malware
• Sophisticated Smartphone Attacks
![Page 19: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/19.jpg)
Dell - Restricted - Confidential
Recent attack examples
![Page 20: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/20.jpg)
Dell - Restricted - Confidential
Cyber-criminal ecosystem • Increase in criminal-to-criminal activity
1. Exploit auction houses (WabiSabiLabi)
2. Forums and IRC (#Vxers, cybermafia.cc)
3. Distribution service (IFRAMES.BIZ)
4. Botnet rental (5Socks.net)
5. Licensing model (storm worm)
6. Identity auctions (76service)
7. Social networks (ranking and escrow)
Fourth generation
Source: Dell SecureWorks
![Page 21: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/21.jpg)
Dell - Restricted - Confidential
#1 74x >
What if Hackers Inc. was a company?
Source: Dell SecureWorks
![Page 22: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/22.jpg)
The connected world creates massive opportunity. And IT needs to be the enabler.
Enter new markets
Drive efficiency
Create new products
Use new technologies
![Page 23: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/23.jpg)
Dell - Restricted - Confidential
Third Platform Technologies are here
Cloud
Social Mobility
Big Data
![Page 24: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/24.jpg)
Dell - Restricted - Confidential
But can introduce known threats...
• Mobile computing has the challenges of malware and phishing
• Cloud computing has the challenges of access and identity, hacking and virtual appliances.
• Social networking has the challenges of privacy and identity theft
• Big data brings the challenges of hacking, ransomware and intrusions leading to mass identity theft.
![Page 25: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/25.jpg)
Dell - Restricted - Confidential
For example, the integration of social networking and the cloud will result in social network credentials being used as an element in identity and access management. We are already seeing this trend emerging on the internet, as Twitter and Facebook credentials are used for identification on other platforms. If used as an access and identity element on sites that require high security, this could introduce significant security challenges as the same social credentials are
exposed in less secure environments.
and connected threats…
![Page 26: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/26.jpg)
27
Dell - Restricted - Confidential
Risky
Security silos create risk that impedes business innovation
Complexity
Threats Compliance
Lack of Resources
Web 2.0
Virtualization Cloud Mobility
Big Data
Ch
alle
ng
es
Op
po
rtu
nit
ies
Expensive
Inefficient
![Page 27: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/27.jpg)
Dell - Restricted - Confidential
Dell delivers a better way, with security that works together across your whole business.
Holistic Proactive
Transparent
![Page 28: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/28.jpg)
29
Dell - Restricted - Confidential
The Dell Security difference
Connected end-to-end
Shared, context- aware intelligence
Built for humans
Makes it easy for people to do the
right thing
Stands in the way of threats, not people and
productivity
Enables proactive protection
everywhere
Share real-time threat information
system-wide
Closes gaps, reduces
complexity and mitigates risk
Secure your business from device to
datacenter to cloud
![Page 29: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/29.jpg)
Dell - Restricted - Confidential
The result: better security, better business
Enable the enterprise to embrace new technologies faster
than the competition
Comply with regulations and achieve consistent, reliable governance
Protect the whole enterprise –
outside in and inside out – efficiently and proactively
![Page 30: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/30.jpg)
Dell - Restricted - Confidential
Delivering best-in-class security solutions
Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov
Security Services Incident Response Managed Security Svcs Security & Risk Consult Threat Intelligence
Data/Endpoint Encryption
Protected Workspace Configuration &
Patch Management Secure Cloud Client
Network Next Gen Firewall
Secure Mobile Access Email Security
![Page 31: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/31.jpg)
Dell - Restricted - Confidential
SonicWALL
SecureWorks
Dell One Identity Solutions
Applications Data
DDP|E
Kace Enterprise
BitLocker Manager
![Page 32: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/32.jpg)
Dell - Restricted - Confidential
Le
t goo
d gu
ys in
K
eep
bad
guys
out
Del
l Se
curit
y Se
rvic
es
Embe
dded
in
Del
l In
fras
truc
ture
&
Dev
ices
Scalable and Mid-Market design point: endpoint to data center to cloud
Application Security
Network Security
Data & Endpoint Security
Dell SonicWALL
Email Security
Dell KACE Configuration
& Patch Management
Dell SonicWALL
Next-Gen Firewall
Dell Data Protection Encryption
Dell SonicWALL
Mobile Connect
Dell KACE K3000 MDM
Endpoint Network Server Storage Cloud
Dell Managed Security Services
Dell Security & Risk
Consulting Dell Threat Intelligence
Dell Incident Response
Dell Wyse
Cloud Client Manager
Dell One Identity
IAM
Did you know
Dell does Security?
Enstratius (Multi-Cloud Manager) IAM
Dell SonicWALL
Secure Remote
Access (SRA)
*formerly Quest One
![Page 33: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/33.jpg)
Dell - Restricted - Confidential
Use case: data security in the cloud
Market trend
Dell Next-Generation Firewalls + Dell Data Protection (Cloud Edition) = Network-enforced encryption
Customer challenges
• Ensure data is encrypted using authorized keys before it leaves the network to be stored or shared in cloud
• Ensure sharing or opening of content is not done by unauthorized users
• Centralize network policy enforcement/ controls • Report on authorized and unauthorized files being
uploaded to cloud
• Growing usage of public cloud storage – users need to share potentially sensitive data
• Compliance requirements demand that data is encrypted before being sent and stored in the cloud
• Lack of enforcement options to protect the organization and the user
![Page 34: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/34.jpg)
Dell - Restricted - Confidential
Security leadership, scale and recognition
Validated by the industry •#1 ranked company in Security 500 •“Recommended” by NSS Labs for Firewall & IPS – 3 years in row •Overall Leader in Access Governance, Kuppinger Cole •Best Security Service, Cloud Security, Compliance, Info Security Products Guide •Recommended by SC Magazine •Major Player, Email Security, IDC •6 Gartner Magic Quadrants
60B+ security events
analyzed daily
2M devices WW
reporting on 40m users
Detects 3B security
events of interest daily
Dell SecureWorks
$14 Trillion in assets
protected daily
15,000 malicious
events analyzed
daily
3,000 security
incidents escalated
daily
Over 18 Trillion
applications controlled
Dell SonicWALL
Dell Data Protection Encryption
Data encrypted & protected on 7M devices
Dell Identity and Access
Management 110M
managed identities
2,000+ security
professionals worldwide
![Page 35: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/35.jpg)
Securing Dell with Dell – Leveraging our Strengths
• Managed Security Services offering – All Dell firewalls & IPS • Monthly average of 22 billion events – 148 escalations back to Dell IT
Security team for investigation (top 10% of SecureWorks customer base)
• Deployed Secure Mobile Access solution to replace incumbent • Started joint development with firewall business unit
KACE K1000 Management Appliance deployed in Dell’s highly secure, segmented PKI environment for full patch management
Deploying on Dell internal notebooks
• Authentication Services & Recovery Manager • Account provisioning through Dell One Identity Manager
Dell on Dell example
![Page 36: Efficiency, effectiveness, productivity: Dell Connected Security in action](https://reader031.vdocuments.mx/reader031/viewer/2022022202/587bfd151a28ab7c668b5c9d/html5/thumbnails/36.jpg)
Connected Security: Competitive landscape What is our unique positioning?
Security niche providers IT solution providers
They can only address part of the problem. You’re left with no choice but to manage an increased number of vendors’ solutions. This leads to a more complex, expensive and fragmented IT and security environment and presents an intolerable level of risk.
They want to impose a large, complex, rigid and expensive platform on you. They lack Dell’s breadth, requiring integration of multiple solutions from multiple vendors. This means more customization and coding–-all at a greater expense to you.
Dell is the only provider that can protect the entire IT landscape,
enabling both visibility and security from the inside-out, as well as the outside-in. This
simpler, more unified approach scales at your
pace by delivering flexible and modular
solutions.
Limited Expensive & Inflexible Sweet Spot: Comprehensive & Flexible