What a data-centric strategy gives you that others do not
-
Upload
dell-world -
Category
Technology
-
view
350 -
download
0
Transcript of What a data-centric strategy gives you that others do not
Brett Hansen
Executive Director, Client Security Software
Todd Peterson
Product Marketing Manager, Identity and Access management
Today’s speakers
Disruptive forces impacting data
Amount of data is becoming more explosive
Analysis is becoming more meaningful
Workforce is becoming more mobile
212 billion Internet of Things connected devices by 2020
50% Organizations cite improvement in quality and speed of decision-making
2 hoursAverage time employees spend working in public places
010101010101010101010101010101010010101101010101010101001011010101
The historical approach of data security
WALLS DIMINISHES ITS VALUELOCKING DATA BEHIND
010101010101010101010101010101010010101101010101010101001011010101
The data is now the perimeter
WALLS DIMINISHES ITS VALUELOCKING DATA BEHIND
A data-centric approach protects the data itself
010101010101010101010101010101010010101101010101010101001011010101
However, wherever, whoever, whenever
010101010101010101010101010101010010101101010101010101001011010101 Wherever it’s accessed
Whoever is accessing
However it’s accessed
Whenever it’s accessed
Practical steps to take to design your own
• Encrypted at the point of creation
• Enhanced with context
• Encryption policies follow data
• Protected over unsecured wireless networks
• Secure remote access
• The right access every time, all the time
• End-to-end privileged access management
• Comprehensive governance
In motion(wherever)
At rest(however)
In use(whoever, whenever)
Encryption and secure containers Network security Identity and access management
Data becomes self-protecting
In summary
The world is changing.
The way people communicate and work is evolving.
Data is everywhere.
The value of data lies in its ability to be accessed when and where it’s needed.
Rethink your data security strategy.
A data-centric approach protects data however, wherever, whoever, whenever.
Pick a place to get started.
Dell can help you get started protecting data at rest, in motion, and in use.
ResourcesRead:Identity for the Real World
Browse:• dell.com/security
• powermore.dell.com
Watch:Dell channel on YouTube
Interact:• @DellSecurity on Twitter
• Dell Security showcase on LinkedIn