Enabling Mobility Without Compromising Security
-
Upload
dell-world -
Category
Business
-
view
110 -
download
0
description
Transcript of Enabling Mobility Without Compromising Security
1 Dell World 2014
Enabling mobility without compromising security
Roger Bjork, Sr. Product Manager
Dell World 2014
2 Dell World 2014
The opportunity and the challenge1
1/3 of employees exclusively use mobile devices to do their work
61% of respondents report that mobile devices have increased productivity
of organizations still have absolutely no security features in place to support mobility / security is inadequate
30%/74%
20,000->28,000 average number of mobile devices managed in large companies
52% security practices have been sacrificed to improve productivity
1. Ponemon Institute, Raytheon, 9/22/14: http://www.darkreading.com/operations/mobile-only-employee-trend-could-break-security-models/d/d-id/1315960?_mc=RSS_DR_EDT
$278 cost to manage devices securely
3 Dell World 2014
Controls?
Access?
Network?
Device?
Secure?
Compromised?
Jail broken?
Threats?
The real problem: We are focused on the wrong thing
Devices
Data
4 Dell World 2014
Five-step framework to securely enable mobility
Secure Mobile Strategy
Text Text
Text Text
Secure Access
• Provide access to the right resources
• Govern applications, data and privileged users
• Enable a secure, encrypted tunnel to corporate resources
Secure Data
• Encrypt & decrypt data
• Centralize & simplify management across multiple environments
• Set policies to wipe data
Secure Endpoint
• Securely manage endpoints & containers
• Manage and provision access
• Automate device discovery & inventory
• Create separate work environments
Secure Network
• Protect network & prevent intrusions
• Scale to offer protection without performance tradeoff
• Define mobile strategy and roadmap & training
• Establish response to threats
5 Dell World 2014
Secure mobile strategy Drives informed decisions through an established, repeatable process,
now and in the future
Understand Deeper dive
• Large enterprise
• Holistic view
• Deep dive in multiple target areas
• Customized Mobile device
audit
User productivity workflows
Mobile content management
Mobile device management
6 Dell World 2014
Secure identity
Provide business-driven access control and governance for users and privileged accounts
Control data and user access – not just the device.
provides secure access to resources, protects systems from direct exposure Foundation
Enforce policy Enhance security Provide unique user sessions Gain awareness
7 Dell World 2014
Secure mobile access Policy-enforced mobile access to mission-critical data and applications
without compromising security
Secure SSL VPN connection and granular network access controls
Context-aware authentication and device interrogation to restrict access to authorized users and trusted devices
One-click mobile access to authorized corporate applications and resources
Centralized access control policy management for efficient administration
Secure Mobile Access appliance
Mobile Connect app
8.1
8 Dell World 2014
Secure data
Comprehensive protection
Protect data on any device, external media and in the cloud with flexible options, including the highest level of FIPS 140-2 protection.
Deploy, enforce and audit compliance policies with pre-set compliance templates and policies.
Easier compliance
Save time with automatic deployment and provisioning, centralized management, and seamless integration with IT processes.
Simplified management
Enable end users to securely work anytime, anywhere, on any device without disruption.
End user productivity
Dell Data Protection Platform
Protect data from device to the cloud
Windows BitLocker SEDs Cloud
Windows or Mac Laptops / Desktops
Removable Media
Full Disk Encryption
Tablets and Smartphones
9 Dell World 2014
Secure network
Gateway protection, inspection for SSL encrypted sessions, and application
intelligence and control
Provide deeper network security for corporate data and protect from threats
• Automatically block attacks
• Automatically identify applications by their DNA
• Single sign-on to identify users
• Illuminate all application traffic on the network
• Control by application and user
10 Dell World 2014
Support devices, users, mobile strategy without the complexity
• Complete, secure endpoint management
• Secure enterprise workspace on all devices
• Secure access to enterprise data
• Integrated console management
• User self-service
• Identity management
• Business apps and services you need
• Flexibility for future-proofing
Secure endpoint
Comprehensive mobile enablement
Endpoint management Workspace management
Mobile Management
System Management
Mobile Workspace
Desktop Workspace
11 Dell World 2014
Five-step framework to securely enable mobility
Secure Mobile Strategy
Text Text
Text Text
Secure Access
• Provide access to the right resources
• Govern applications, data and privileged users
• Enable a secure, encrypted tunnel to corporate resources
Secure Data
• Encrypt & decrypt data
• Centralize & simplify management across multiple environments
• Set policies to wipe data
Secure Endpoint
• Securely manage endpoints & containers
• Manage and provision access
• Automate device discovery & inventory
• Create separate work environments
Secure Network
• Protect network & prevent intrusions
• Scale to offer protection without performance tradeoff
• Define mobile strategy and roadmap & training
• Establish response to threats Dell SecureWorks Mobile Security
Services & Solutions
Dell One Identity Solutions
Dell SonicWALL Secure Mobile Access
Dell Data Protection – Mobile Edition
Dell Enterprise Mobile Management
Dell KACE
Dell SonicWALL Next-Generation Firewalls
12 Dell World 2014
How Dell sees mobility done securely
100% cloud enabled, self-serviced
Rich user experience delivered as a single app on user’s device; private and secure
Single subscription charge for best-in-breed productivity services
Single point of integration into IT infrastructure (AD)
Secure workspace attributes include data leakage protection, secure remote access, identity management, encryption, and management functions
Voice & Messaging Dell Business Phone
File sync and share Box for Dell
Email, cal, contacts Microsoft Office 365
Corporate web apps Mobile Connect SMA
Secure workspace Dell Mobile Workspace
Mobile productivity
Reduce IT costs, simplify deployment complexity, provide faster employee time-to-productivity, deliver complete employee privacy and freedom
13 Dell World 2014
Snapshot • Public school district with
26,000 students and 4,800 teachers /staff
• 21 elementary schools, six middle schools and seven high schools
Challenge District is tasked with securing on its network over 9,000 student and employee mobile devices at any one time.
Results • By deploying a Dell SonicWALL solution, district cuts costs
by 50% • Students increase access to critical educational resources; teachers
can access other schools around the world • Mobile device users are authenticated, ensuring secure BYOD
14 Dell World 2014
The Dell difference: Security designed for a connected world
• Integrated, comprehensive portfolio secures from device to datacenter to cloud
• Shared intelligence across silos eliminates proprietary islands of information that create security gaps
• Considers the human factor to “keep the good guys good” without getting in the way of user productivity
Enable the enterprise to embrace
new technologies faster than the competition
Comply with regulations and achieve
consistent, reliable governance
Protect the whole enterprise –
outside in and inside out – efficiently and proactively
15 Dell World 2014
Dell delivers best-in class security solutions
Identity & Access Mgmt
Identity Governance
Privileged Mgmt
Access Mgmt
Compliance & IT Gov
Security Services
Incident Response
Managed Security Svcs
Security & Risk Consult
Threat Intelligence
Data/Endpoint
Encryption
Protected Workspace
Configuration & Patch
Management
Secure Cloud Client
Network
Next Gen Firewall
Secure Mobile Access
Email Security
16 Dell World 2014
Dell Security leadership, scale and recognition
Validated by the industry • #1 ranked company in Security
500 • NSS Labs “Recommended”
Firewall & IPS – 3 years in row • Overall Leader in Access
Governance, Kuppinger Cole • Best Security Service, Cloud
Security, Compliance, Info Security Products Guide
• Recommended by SC Magazine • Major Player, Email Security, IDC • 6 Gartner Magic Quadrants
76B cyber events
analyzed daily
2m devices WW
reporting on 40m users
5.9B security events of
interest daily
Dell SecureWorks
$14 trillion in assets
protected daily
1.06 trillion IPS
incidents detected &
blocked
5,000 security
incidents escalated
daily
1.78 billion malware
downloads blocked
Dell SonicWALL
Dell Data Protection Encryption
Data encrypted
and protected on 7m devices
Dell Identity and Access
Management 110m
managed identities
2,000+ security
professionals worldwide
17 Dell World 2014
Next steps
Visit the Security deep dive area, or the Protect lane in the Solutions Expo to see a demo
Attend other Security sessions: • MT23: Data Protection for
Data Everywhere: Utilizing Context-Aware Security Controls
• MT25: Overcoming Compliance Challenges: A 5-Step Path to Governance
Dig in at the Hands on Lab
Dell World 2014
Thank you.
Want to learn more about Dell’s security solutions?
Learn via email. Start here.
Sign me up!