Dell best-practice sharing: How Dell stays secure and compliant worldwide - Daines
-
Upload
dell-world -
Category
Technology
-
view
381 -
download
0
Transcript of Dell best-practice sharing: How Dell stays secure and compliant worldwide - Daines
#1 RankedSecurity company in Security 500
30K+ ConcurrentConnections on SonicWALL Aventail
250+SonicWALL Supermassive firewalls deployed
117KSystems encrypted with Credant
63B Dell EventsAnalyzed by SecureWorks monthly
250k Identities managed by D1IM
Dell - Restricted - Confidential6
Organizational Structure
Security Infrastructure
Security Consulting
Governance, Policy & Risk
Cyber Response Services
• 4 components: Network Security, Security Tools, Identity & Directory Services, and Technology Strategists
• Engineering & Operations combined in each component (except Strategists)
• Supported Technologies: Firewalls, IPS, Proxies, DDOS Protection, VPN, Antivirus, HIPS, DLP, PKI, RMS, SIEM, Password Vault, Hard Drive Encryption, Active Directory, Single Sign-On, etc.
• Provides security design/architecture advice for product development, software development, infrastructure deployments, services delivery, and 3rd party relationships.
• Oversees secure development lifecycle utilizing source code analysis and threat modeling.
• 3 Components: eForensics, Threat & Vulnerability Management, and Incident Response
• Key Activities: Litigation Support, Ethics Investigations, Pen Testing, Vulnerability Scanning & Remediation Oversight, Incident Management, 1st Level Security Helpdesk, etc.
• Responsible for Compliance and Risk Management for the IT organization.
• Key Areas: PCI, SOX/Financial Reporting, Self-Assessments, Risk Assessment, Policies & Standards, and Data Classification.
CISO
Securing Dell with Dell – leveraging our strengths
SonicWALL
• 30,000 concurrent users enjoy quick, reliable SonicWall VPN access
• Manage changes across more than 700 firewalls worldwide.
Dell IAM
• Simplifying IAM and automated provisioning using Dell One Identity
• Protection against Insider Threats using Dell Change Auditor
KACE
• Deployed KACE K1000Management Appliance
• Full patch management in Dell’s highly secure, segmented PKIenvironment
DDP | E
• 111,000 Dell endpoints encrypted to keep data safe in case a device is lost or stolen
SecureWorks
• Security monitoring for all Dell Firewalls and IPS
• Monthly 60 billion events monitored for Dell