Dell Connected Security Solutions

15
Dell Connected Security Solutions Simplify & unify

description

Dell Connected Security Solutions. Simplify & unify. Trends force changes in the way you do business. A changing IT landscape = security challenges = RISK . SECURITY CHALLENGES. TRENDS. Advanced persistent threats, breaches, attacks, malware. - PowerPoint PPT Presentation

Transcript of Dell Connected Security Solutions

Page 1: Dell  Connected Security Solutions

Dell Connected Security SolutionsSimplify & unify

Page 2: Dell  Connected Security Solutions

2 Confidential Dell Software

Trends force changes in the way you do business. A changing IT landscape = security challenges = RISK TRENDS SECURITY

CHALLENGES

CloudBYOD

Virtualization &new technologies

Patchwork of vendor solutions =>

disjointed & siloed

Explosive data growth $Limited budget and

expertiseTime & complexity of

management & reporting

Insufficient visibility and counter measures

Compliance

Advanced persistent threats, breaches, attacks, malware

Page 3: Dell  Connected Security Solutions

3 Confidential Global Marketing

It’s all about the data

Page 4: Dell  Connected Security Solutions

4 Confidential Dell Software

Dell Software

2009 2020

Volume of data storedZettabytes0.8

35

Estimated cost to US businesses from data

breaches in 2011, (Online Trust Alliance)

$6.5B $5.5MAverage cost of a data

breach in 2011, (Ponemon Institute)

New malware samples discovered by researchers every day. (Georgia Tech)

100,000New malware samples detected by Antivirus solutions, (Cyveillance)

19%

7,000+New vulnerabilities tracked in 2011 by the Counter Threat Unit

Page 5: Dell  Connected Security Solutions

5 Confidential Dell Software

Data is your competitive advantageIt must be protected to maintain business continuityWhat if a single solution could help you:• Respond quickly to security threats and problems before they

negatively impact the business?• Protect every part of the infrastructure – inside and outside the

network –reducing the number of vendors and disparate solutions and gaining efficiencies by reducing costs?

• Provide common-sense reporting that spans across areas of the network and infrastructure, helping to reduce the risk of errors from missed problems or threats, and saving time?

• Unify the patchwork of processes, reducing the complexity of meeting security and compliance objectives?

Page 6: Dell  Connected Security Solutions

6 Confidential Dell Software

Dell simplifies & unifies securityConnected SecuritySolutions from Dell reduce risk and help you achieve a simpler, more unified approach to securing critical data and achieving compliance by providing common-sense reporting, unifying threat mitigation and ensuring fast response.

Comprehensive coverage

Enable users (and the business)Simpler, more unified

Inside-out, outside-in protection

Built around the pillars of Embed, Detect, Protect and Respond, secure data from the device, to the datacenter, to the cloud.

Gather, analyze, inform and act

Realize a simpler approach to security, and enable a unified view of security with integrated, industry-leading “best of breed” solutions.

Confidently embrace BYOD and the cloud

Ensure the secure, compliant use of mobile technologies and the cloud by providing the right access to the right applications regardless of the device.

Page 7: Dell  Connected Security Solutions

7 Confidential Dell Software7

Protect sensitive information with user access controls

Respond to breaches with quarantine and remediation

Embed security into devices

and solutions with integrated security

Detect and mitigate

security risks beforethey impact your

environment

Connected Security: Outside-in and inside-out protection, from device to datacenter to cloud

IdentityAccess GovernancePrivileged Acct MgmtIdentity AdministrationUser Activity Monitoring

Security ServicesIncident ResponseManaged Security SvcsSecurity & Risk Consult

Data & EndpointsData Protection &

Encryption

NetworkNext Gen Firewall

Secure Remote AccessEmail

Dell Quest One Identity Solutions

Dell SecureWorksor local Partner

Dell Data Protection & EncryptionDell KACE

Dell SonicWALL

Page 8: Dell  Connected Security Solutions

8 Confidential Dell Software

Identity and access management for the real world

Protect critical data with user access controls Access Governance

Control & audit superuser access Privileged Account Management

Manage the entire lifecycle of identities Identity Administration

Monitor user activity & system access; respond tointernal threats User Activity Monitoring

Page 9: Dell  Connected Security Solutions

9 Confidential Dell Software9

Network security without sacrificing performance or productivity

Detect threats & protect the network with next-gen firewalls & unified threat management

Network Security

Enable SSL VPN access from virtually any endpointSecure Remote Access

Protect against viruses, zombies, spam, phishing & other attacks with multiple threat detection techniques

Email & Web Security

Page 10: Dell  Connected Security Solutions

10 Confidential Dell Software

Endpoint security to protect data and enable users

Protect critical data from spyware, spam and virusesEndpoint Security

Centralize control of endpoints Endpoint Management & Compliance

Protect data wherever it rests with encryption Endpoint Encryption & Data Protection

Page 11: Dell  Connected Security Solutions

11 Confidential Dell Software11

Security services detect, protect and respond to emerging threats 24x7x365

Protect the network, safeguarding the perimeter, critical internal assets, data, remote users, customers and partners

Managed Security Services

Enhance security posture, reduce risk, facilitate compliance and improve operational efficiency

Security & Risk Consulting

Provide rapid containment and eradication of threats, minimizing the duration and impact of a security breach

Incident Response

Identify emerging threats, develop countermeasures against new malware and exploits, and protect customers

Counter Threat Unit

Page 12: Dell  Connected Security Solutions

12 Confidential Dell Software

Connected Security enables organizations to securely embrace BYOD

Establish and enforce access rights – data, resources and roles

• Manage the device(patch, config, remotelock)

• Encrypt data whereverit goes

• Enable secure remote access through SSL VPN

• Preserve performance with application intelligence

Dell Quest One Identity Solutions

Dell KACEDell Data Protection

& Encryption

Dell SonicWALL

AccessApplicationDevice

Page 13: Dell  Connected Security Solutions

13 Confidential Dell Software

Connected Security enables organizations to confidently adopt the cloud

Dell SecureWorksor local Partner

Dell SonicWALL

• Establish and enforce access rights – data, resources and roles

• Provide SSO for cloud-based apps

• Control use of privil-eged credentials

Dell Quest One Identity Solutions

• Secure the data centerhousing the cloud

• Enable secure remote access through the cloud from anywhere

• Improve email securitythrough the cloud

Encrypt and decryptdata stored and sharedin public cloud storageservices

Dell KACEDell Data Protection

& Encryption

• Managed security services

• Assessments, testing and auditing

Page 14: Dell  Connected Security Solutions

14 Confidential Dell Software

Dell Software solutions

Data center & cloud management

• Client management• Performance

management• Virtualization & cloud

mgmt• Windows server mgmt

• Mobile device mgmt• Desktop virtualization• Application/data access• Secure remote access

Information management

• Database management• Business

intelligence/analytics• Application & data

integration• Big data analytics

Mobile workforce management

• Identity & access management

• Network security• Endpoint security• Email security

Security Data protection• Enterprise backup/recovery• Virtual protection• Application protection• Disaster recovery

Page 15: Dell  Connected Security Solutions

Thank you