OUTSIDE MARKET FORCES
DELL CONFIDENTIAL 2
There are 3.4 identities stolen every 12 seconds and produces an average loss of $3,257 per event.
Identity TheftCOUNTERFEIT
In the first quarter of 2008, there were $76 million of counterfeit networking boards seized by government officials.
Intelligence analysts state that China’s military regards offensive computer operations as “critical to seize the initiative” in the first stage of a war.
2008 ASIS ConferenceTechnolytics State of Insecurity
Answer today:Separate / isolate the riskRemove the weakest link
Multi-Level Security (MLS)
In the first quarter of 2008, there were 360,000 counterfeit microprocessors seized by government officials.
COUNTERFEIT
IMPACT OF SEPARATION / PAIN POINTS
Results of Pain Points:– Security requirements may be waived or circumvented to accommodate
the mission and flexibility of end-user and administrator
– Systems may not be maintained to standards because of increased complexity
– IT managers forced to balance management and level of risks with the agency’s mission and end-user needs.
DELL CONFIDENTIAL
Increased Network Security – layered, separate networks to block unauthorized data access/security breaches
Complex infrastructure – multiple client platforms/user; requires increased cost/management
Increased Staffing – duplicate management and break-fix
Inefficient – Cross Domain coordination
3
MISSION VALUE - RISK TOLERANCE ALIGNS INVESTMENT
Agency Initiatives
Information Technology Environment
Mission ComplianceCost Reduction Continuity of OperationsCustomers
Where does it go?
What information is important to
protect?
What are the potential threats?
Risk
What risks do we accept?What risks do we need to protect against to enable
the mission?
S E N S I T I V E S E N S I T I V E I N F O R M A T I O NI N F O R M A T I O N
S E N S I T I V E S E N S I T I V E I N F O R M A T I O NI N F O R M A T I O N
NetworkEndpoint App/DB StorageFS/CMS
S E C U R I T Y S E C U R I T Y I N C I D E N T SI N C I D E N T SS E C U R I T Y S E C U R I T Y I N C I D E N T SI N C I D E N T S
5
DELL CONFIDENTIAL 7
KEY TENETS Engineered into platform
Supports OEM Model High-Assurance Technologies Simplify for end-user Commoditize for cost savings Lifecycle consideration
DELL SECURITY SOLUTIONS MARKET APPROACH
PARTNER SOLUTION
DELL CONFIDENTIAL
Thin client approach, using software (from partner) to address MLS
Dell provides hardware and support services
Partner provides all integration and solution support
8
Software at a host, allowing One Computer to access Multiple Domains
BUNDLED SOLUTION
DELL CONFIDENTIAL 9
Multiple Virtual Machines (VMs) approach to MLS on a “fat client”
Complete Data Separation Between VMs
Solution tested and certified by Dell and the partner
DoD and IC Certified
Fully supported (Help Desk and repair) by Dell and partner
Software Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains
ENGINEERED SOLUTION
DELL CONFIDENTIAL
HardwareBSP
Separation Kernel
ASP
Secure Separation Domain
VMM
10
OS Allowing One Computer to Host Multiple Operating Systems, Security Levels and Domains
Multiple Virtual Machines (VMs) approach to MLS on a “fat client”
Complete OS & Data Separation Between VMs
Solution engineered, from the beginning by Dell and key partners
Tested and certified by Dell and the partners
EAL Level 6 certified OS
Fully supported (Help Desk and repair) by Dell
WHAT ARE THE APPLICATIONS NEEDING MLS TECHNOLOGY?
TODAY:Intelligence & Defense:
– Multiple Security Domains– Consolidated Battle Space View– Consolidated Inbox– Collaboration & Information Sharing
INCREASINGLYCritical Infrastructure:
– Financial– Utilities– Healthcare
11
MLS technology is the foundation for building these future capabilities
DELL CONFIDENTIAL
DELL TECHNOLOGY VISION
Why invest in Security Solutions? Market trending toward higher security solutions Differentiated product Large opportunity for differentiated secure platform
What does Dell contribute? Production scale Unique capability to enhance security at
foundation OEM support model Standards Development
DELL CONFIDENTIAL 12
Top Related