dell sonicwall connected security

46
May 2013 The Power to Do More with Dell Connected Security

Upload: motty-ben-atia

Post on 22-Jan-2015

577 views

Category:

Technology


0 download

DESCRIPTION

Dell sonicwall connected security

TRANSCRIPT

  • 1. May 2013 The Power to Do More with Dell Connected Security

2. DSG within Dell Security within DSG 2 3. Software is an integral part of the Dell strategy Delivering end- to- end solutions with scalable, mid- market design point Servers, Networking and Storage Services & Cloud End-User Computing Software End-to-end ITSolutions Scalable,designpoint 4. End- user computing Services, Security, Cloud Server, storage and networking capabilities Software that leverages Dell core strengths No legacy to protect Dell Software leverages our core strengths 5. Dell Software solutions Data center & cloud management Client management Performance management Virtualization & cloud mgmt Windows server mgmt Mobile device mgmt Desktop virtualization Application/data access Secure remote access Information management Database management Business intelligence/analytics Application & data integration Big data analytics Mobile workforce management Identity & access management Network security Endpoint security Email security Security Data protection Enterprise backup/recovery Virtual protection Application protection Disaster recovery 6. New malware samples discovered by researchers every day, according to Georgia Tech100,000 $5.5MAverage cost of a data breach in 2011, according to Ponemon Institute research Estimated cost to US businesses from data breaches in 2011, says Online Trust Alliance $6.5B 60% 7,000+ New vulnerabilities tracked in 2011 by the Counter Threat Unit New malware samples detected by Antivirus solutions, Cyveillance study shows 19%Estimated number of healthcare providers with 2 or more breaches in the last two years 7. Trends force changes in the way you do business. A changing IT landscape = security challenges = RISK Trends Security Challenges Cloud BYOD Virtualization & new technologies Patchwork of vendor solutions => disjointed & siloed Explosive data growth $ Limited budget and expertise Time & complexity of management & reporting Insufficient visibility and counter measures Compliance Advanced persistent threats, breaches, attacks, malware 8. Threats? What threats? 9 9. Threats & Attacks are constantly increasing and evolving 11 10. Evolutions within companies 18 11. Users are Increasingly Out of Your Control Day Extenders Home Office Users Traveling Executives Kiosks/Public Machine Users Tablets & Smart Phone Users Wireless LAN Users VOIP Users Business Partners/ Extranet Users Internal Users External Users More Devices Saas/Hosted Apps Social Media Network environments Mobility Saas, Web 2.0 Real-Time Apps 12. Why Mobile Devices Could Be Risky? 20 13. Were not protected with mobile security features1 57% Of lost laptops contained confidential data1 46%Average value of lost laptop1 $49,246 $5.5M IT managers are looking for ways to: + Fully protect data wherever it goes without disrupting end users + Save time deploying and managing security + Ensure they remain in compliance + Flexible scale to ensure they meet the requirements of different users Data is the most important asset companies own: + Intellectual Property + Customer and employee data + Competitive information Source: 1. Poneman Institute Study Source: 2 Symantec & Poneman Institute Study: US cost of a Data Breach, 2011 Average organizational cost of a data breach2 Every 53 Seconds a laptop is stolen Dell Solutions Tour 14. Does Dell Have an Answer and Why Dell? - Of course because Dells in the problem solving business. Lets talk about why Dell for IT security. Dell Solutions Tour Dell Solutions Tour 15. Dell belief: there is a better way Silos and layers add stress to your resources Difficult to get to work together Limited security resources Individual job done well in silos Solutions often dont work together Solutions dont work across the business The problem: Today, layers and silos get the security job done but often have gaps = business risk 16. Our POV: Connected Security for a connected world Connected Security is security that Shares and applies intelligence Works with the business, end- to- end Maintains flexibility and open architecture Enables broad contextual awareness with dynamic control Security to enable business while also meeting the needs of security Protect information everywhere Effective Work with the business Efficient 17. Firstly: Dell security and business solutions are recognized in the Gartner Magic Quadrants 2011 to 2013 Managed Security Service Providers Unified Threat Management User Administration and Provisioning Identity and Access Governance Enterprise Network Firewalls Secure Email Gateways Enterprise Backup/Recovery Software Challengers Niche Players Visionaries Leaders Security Solutions Mobile Data Protection E- Class SRA SSL VPN 18. Data - Dell Data Protection | Encryption Configuration & Patch Management Identity - Dell One Identity Identity & Access Management Network - Dell SonicWALL Next- generation Firewall Secure Remote Access Email Security Security Services- Dell SecureWork Incident Response Managed Security Services Security & Risk Consulting cloud Data center End points Secondly: Dell Connected Security Solutions are comprehensive and complete Dell Solutions Tour 19. OK so that all sounds good.. Tell me more about delivering on your approach. - Well look at the parts and Ill show you how the sum ends up being greater than the whole. Dell Solutions Tour 20. Securing & Monitoring Data and Access KACE DDP|E SonicWALL Applications Data SecureWorks 21. Connected Security: Competitive landscape What is our unique positioning? Security niche providers IT solution providers They can only address part of the problem. Youre left with no choice but to manage an increased number of vendors solutions. This leads to a more complex, expensive and fragmented IT and security environment and presents an intolerable level of risk. They want to impose a large, complex, rigid and expensive platform on you. They lack Dells breadth, requiring integration of multiple solutions from multiple vendors. This means more customization and coding -all at a greater expense to you. Dell is the only provider that can protect the entire IT landscape, enabling both visibility and security from the inside- out, as well as the outside- in. This simpler, more unified approach scales at your pace by delivering flexible and modular solutions. Limited Expensive & Inflexible Sweet Spot: Comprehensive & Flexible 22. Dell SonicWALL Next-Generation Firewalls 23. Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs). Typically, midsize businesses have 100 to 1,000 employees, with revenue ranging from $50 million to $1 billion. Gartner recognizes Dell as a Leader in network security. Download the full report for free: http://www.sonicwall.com/us/en/14539.html 24. NSS Labs Recommends Dell as a trusted NGFW provider. Download the full report for free: http://www.sonicwall.com/us/en/17360.html 25. Dell SonicWALL Next Generation Firewalls SuperMassive E10800 SuperMassive E10400 SMB/Campus/Branch Enterprise, Data Center SuperMassive Series TZ 215/W TZ 205/W TZ 105/W SuperMassive 9600 SuperMassive 9400 SuperMassive 9200 TZ Series NSA 4600 NSA 3600 NSA 2600 NSA 220/250M NSA 6600 NSA 5600 NSA Series 26. Policy Application intelligence, control and visualization Identify Categorize Control ?? ?? ?? ? Process Visualization 27. Consistent Threat Protection 28. Secure remote access Email security Policy & management Hosted Network security Dell SonicWALL product portfolio Clean wireless SonicPoint-N Series WAN acceleration Application Intelligence and Control GAV/ Anti- Spyware Intrusion Prevention Comprehensive Anti- Spam Service Enforced Client Anti- Virus Content Filtering Service Global VPN Client SSL VPN For Network Security Secure Virtual Assist Mobile Connect End Point Control Connect Mobile Spike License Pack Advanced Reporting Native Access Module Secure Virtual Assist Secure Virtual Access Secure Virtual Meeting Mobile Connect Web Application Firewall Email Protection Email Anti- Virus Email Compliance Global Management System Analyzer Scrutinizer 29. Dell DSG Partner Direct Program 38 30. Systems Management Client management Performance monitoring (ETA: 11/1) Virtualization & cloud (ETA: 11/1) Windows server management Information Management Database management Identity & access management Network security Security Data Protection Competency Specialization Tracks Confidential39 Global Commercial Channels 31. Example - Security Competency Confidential40 Network Security (SonicWALL) Sales (2 Preferred/4 Premier unique individuals, ~2 hr) Two Required Courses: Security Competency Overview - SECC0913WBTS Dell SonicWALL Sales Training - DSW0512WBTS Technical (2 Preferred/4 Premier unique individuals, ~2 hr) Two Required Courses: Security Competency Overview - SECC0913WBTS Dell SonicWALL Technical Training - DSWT0512WBTT Dell NSBA Lab Training Identity and Access Management Sales (2 Preferred/4 Premier unique individuals, ~2 hr) Two Required Courses: Security Competency Overview - SECC0913WBTS Identity and Access Management Sales Training - IAM0913WBTS Technical - (2 Preferred/4 Premier unique individuals, ~7- 8hr) Three Required Courses: Security Competency Overview - SECC0913WBTS Dell One Identity Manager (Quest One Identity Manager) Technical Training - IDMA0913WBTT Total Privileged Access Management Value Proposition - TPAV0913WBTT Cross-sell Optional Network Security Curriculum: KACE Sales/Technical Training Dell Data Protection and Encryption with Credent (Sales) 32. Dell.com/partner Confidential41 Log in to Partner Direct To get a Partner Direct log in: Certified partners: NAM email: [email protected] EMEA email: [email protected] Sign up with Partner Direct 33. Competency descriptions Click Competencies to view competency descriptions Check out the Why Certify with Dell Blog 34. Training Confidential43 Click link under a competency to see course catalog and launch course OR click Enroll in a course to access NetExam training. Click Training & Competencies Course catalog path Direct to NetExam path 35. Course catalog path to training Confidential44 C lick Launch to open a course. C lick Enroll to begin a course. 36. Direct to NetExam path to training Confidential45 Click Training to access training Click to access Transcript 37. Competency tracks Confidential46 Select a competency track Every student is enrolled in ALL available competency tracks The DSG competency tracks will be on the list along with the others For DSG, there will be separate tracks for sales and technical training Once a student completes all the requirements of a competency track, it disappears from this list 38. Course Completion Certificates Confidential47 DSG Sales/Technical in Partner Direct Certification granted at the Partner company level and tracked in CTT (Certification Tracking Tool) Post- sales certification Admin and Implementation Granted at the individual level, follows the individual GCC Sales/Technical in Partner Direct Certification granted at the Partner company level and tracked in CTT Install certification Granted at the individual level, follows the individual; partner must have 1 install certified individual to bypass the Dell Services Sku 39. Secure remote access Email security Policy & management Hosted Network security Dell SonicWALL product portfolio Clean wireless SonicPoint-N Series WAN acceleration Application Intelligence and Control GAV/ Anti- Spyware Intrusion Prevention Comprehensive Anti- Spam Service Enforced Client Anti- Virus Content Filtering Service Global VPN Client SSL VPN For Network Security Secure Virtual Assist Mobile Connect End Point Control Connect Mobile Spike License Pack Advanced Reporting Native Access Module Secure Virtual Assist Secure Virtual Access Secure Virtual Meeting Mobile Connect Web Application Firewall Email Protection Email Anti- Virus Email Compliance Global Management System Analyzer Scrutinizer 40. Solutions overview Dell Network Security Solutions 49