what a data-centric strategy gives you that others do not

15
MT 38: What a data-centric strategy gives you that others do not

Upload: dell-world

Post on 14-Apr-2017

350 views

Category:

Technology


0 download

TRANSCRIPT

MT 38: What a data-centric strategy gives you that others do not

Brett Hansen

Executive Director, Client Security Software

Todd Peterson

Product Marketing Manager, Identity and Access management

Today’s speakers

Disruptive forces impacting data

Amount of data is becoming more explosive

Analysis is becoming more meaningful

Workforce is becoming more mobile

212 billion Internet of Things connected devices by 2020

50% Organizations cite improvement in quality and speed of decision-making

2 hoursAverage time employees spend working in public places

“The value of an idea lies in the using of it.”

– Thomas Edison

010101010101010101010101010101010010101101010101010101001011010101

The historical approach of data security

WALLS DIMINISHES ITS VALUELOCKING DATA BEHIND

010101010101010101010101010101010010101101010101010101001011010101

The data is now the perimeter

WALLS DIMINISHES ITS VALUELOCKING DATA BEHIND

A data-centric approach protects the data itself

010101010101010101010101010101010010101101010101010101001011010101

However, wherever, whoever, whenever

010101010101010101010101010101010010101101010101010101001011010101 Wherever it’s accessed

Whoever is accessing

However it’s accessed

Whenever it’s accessed

The key components of data security

Network End userDataServices

Practical steps to take to design your own

• Encrypted at the point of creation

• Enhanced with context

• Encryption policies follow data

• Protected over unsecured wireless networks

• Secure remote access

• The right access every time, all the time

• End-to-end privileged access management

• Comprehensive governance

In motion(wherever)

At rest(however)

In use(whoever, whenever)

Encryption and secure containers Network security Identity and access management

Data becomes self-protecting

In summary

The world is changing.

The way people communicate and work is evolving.

Data is everywhere.

The value of data lies in its ability to be accessed when and where it’s needed.

Rethink your data security strategy.

A data-centric approach protects data however, wherever, whoever, whenever.

Pick a place to get started.

Dell can help you get started protecting data at rest, in motion, and in use.

Q & A

ResourcesRead:Identity for the Real World

Browse:• dell.com/security

• powermore.dell.com

Watch:Dell channel on YouTube

Interact:• @DellSecurity on Twitter

• Dell Security showcase on LinkedIn

Thanks!