dell client solutions security portfolio 2014
TRANSCRIPT
1
Dell Client Solutions Security Portfolio
August 2014
Client Solutions Security
Market trends are increasing pressure on endpoint security
Compliance Pressures75% of organizations lack resources to meet compliance regulations. 73% say increasing audit burden is their biggest challenge.3
Evolving User Behavior200 million employees bring their own device to work.1 66% use free file-sharing platforms to share corporate data.2
Data Explosion2.5 quintillion bytes of data created every day, and end users are accessing it everywhere.4
Growing ThreatsIn just one month, 280 million malicious programs, 134 million Web-borne infections, and 24 million malicious URLs are detected.5
Endpoint Security
1. Mobile Is The New Face Of Engagement, Forrester Research, February 20122. Workforce Mobilization: What Your I.T. Department Should Know, SkyDox, June
20123. 2013 State of the Endpoint, Ponemon Institute, December 2012
4. Understanding Big Data, IBM 5. Kaspersky April 2012 Threat Report
Client Solutions Security3
The IT balancing act
End user demands
Data protection
How do you balance end user expectations to work when and where they want, on any device with the need to protect data and meet compliance?
Client Solutions Security
Organizations are looking for ways to:
04/18/20234
as it moves with end users
without adding IT burden
of the entire endpoint security strategy
without disruption or risk
Protect data
Meet compliance
Simplify management
Enable productivity
Client Solutions Security5
At Dell, we believe endpoint security and compliance don’t have to be difficult or disruptive.
Dell endpoint security solutions protect data wherever it goes without sacrificing IT or end user
productivity.
Our endpoint security point of view
Client Solutions Security6
Dell recommends: Every endpoint security strategy should include four key components
Encryption Malware Prevention
Authentication
Centralized, remote management
Ensure only authorized users have access to your data
Proactively protect users and data against daily threats
Protect data no matter where end users take it
Client Solutions Security7
Encryption Malware Prevention
Authentication
Centralized, remote management
Ensure only authorized users have access to your data
Proactively protect users and data against daily threats
Protect data no matter where end users take it
Dell Data Protection portfolioOnly Dell offers a complete portfolio of endpoint security solutions
Dell Data Protection | Security ToolsComprehensive line-up of authentication solutions
Dell Data Protection | EncryptionA simple, comprehensive, flexible way to protect data from device to the cloud
Dell Data Protection | Protected WorkspaceA proactive approach to defeating malware and advanced persistent threats in real-time
Client Solutions Security8
File level encryption that protects data no-matter where is goes…
…and IT maintains encryption keys and control
Dell Data Protection | EncryptionVirtually transparent to end-users
Provides end-user data protection across end-points
Single management console
Available on both Dell and non-Dell systems.
Corporate issue
PC
Personal tablet
BYOD Smartpho
ne
USB Remote
media
Publi
c Cloud
Company data File level
encryption
Client Solutions Security
Broadest range of fully-integrated advanced authentication options, including fingerprint, smart card and contactless smart card readers and hardware credential processing.
FIPS 140-2 compliant TPM, hardware password manager for more secure credential protection and FIPS 201 compliant fingerprint reader
Consolidated management of access control and encryption policies from one console and easy deployment and integration with single sign-on for Windows Active Directory.
Advanced authentication credentials enable employees to log in once without having to memorize multiple passwords – or worse – write them down!
9
Dell authentication solutions
Flexible, secure solutions to keep unauthorized users out of your data and your business
Comprehensive protection
Easier compliance
Simplified management
End user productivity
Client Solutions Security10
Dell Data Protection | Protected Workspace
A proactive approach to defeating malware and advanced persistent threats in real-time
Comprehensive protectionAutomatically detects and blocks all malicious behavior – even zero-day attacks that traditional AV/AM software hasn’t learned of yet.
End user productivityEnd users securely work as they always have using the tools they need, without interruption.
Easy activationShips pre-installed on Dell commercial PCs and saves IT countless hours of remediation work.
Client Solutions Security11
Simplified central management without disruption
Save time with a single remote management console, easy deployment and seamless integration into your IT environment
Centralized, remote
management
Reduce deployment time
with auto provisioning feature available when
purchased on a Dell commercial device
Deploy 5X faster than traditional
encryption solutions, saving >3 hours per PC
Single source
for solutions and support
Remotely manageall endpoint security needs from a single
console: encryption and authentication, port control, compliance,
and cloud and mobile security
Data-centric encryption
won’t interfere with existing IT maintenance
tools, such as patch management
12
Questions?
Contact a DDP | E Specialist directly at: [email protected]
Visit www.dell.com/dataprotection