efficiency, effectiveness, productivity: dell connected security in action

36
Welcome! Delldirekte.no/DellST14

Upload: kenneth-de-brucq

Post on 16-Jan-2017

1.316 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Efficiency, effectiveness, productivity: Dell Connected Security in action

Welcome! Delldirekte.no/DellST14

Page 2: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell Solutions Tour 2014

We welcome you together with our partners!

Page 3: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell Solutions Tour 2014

Page 4: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell Solutions Tour 2014

Page 5: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell Solutions Tour 2014

Connect with us

@DellLytter @DellDirekte

http://www.linkedin.com/company/dell

https://www.facebook.com/DellNorway

DellDirekte.no

#DellST14

Delldirekte/DellST14

Page 6: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell Solutions Tour 2014

Page 7: Efficiency, effectiveness, productivity: Dell Connected Security in action

The Dell Advantage

Florian Malecki

International Product Marketing Director – Dell Security

Page 8: Efficiency, effectiveness, productivity: Dell Connected Security in action

The Dell Advantage Presenter name Presenter title Date

What if….

Page 9: Efficiency, effectiveness, productivity: Dell Connected Security in action

Making technology more accessible Giving organizations of any size the power to do more

Page 10: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell Solutions Tour 2014

Practical innovation Our Research & Development strategy

• Best-of-breed platforms

• Organic innovation • Integration across

all elements

Build

• Joint product and solution engineering and testing

• Common strategic roadmaps

Partner

• $18 billion and 20 acquisitions

• Full adherence to the Dell design philosophy

Acquire

Page 11: Efficiency, effectiveness, productivity: Dell Connected Security in action

The intersection of traditional and new IT

Page 12: Efficiency, effectiveness, productivity: Dell Connected Security in action

Ready for tomorrow

Optimized for today

Page 13: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell Solutions Tour 2014

Standards-based No deliberate proprietary lock in

Dell is different Reach your full potential without limitations

Modern platforms No vested interest in legacy systems

End-to-end solutions No siloed viewpoint or hidden agenda

Flexible scaling No forced constraints or rip-and-replace

Modular systems No costly monolithic stacks

Open approach No intentionally closed ecosystems

Page 14: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell Solutions Tour 2014

Leadership that benefits every customer Making powerful technology more accessible and affordable

Search

4 of 5 top search engines worldwide powered by Dell

Data center

#1 provider of virtualized data center infrastructure

Social

3 of 4 top social media websites are powered by Dell

Cloud

#1 provider of cloud infrastructure—over 1M servers shipped

Software

90% of Fortune 1000 companies use Dell software

Servers

#1

server provider in North America, Latin America, China

Storage

#1 provider of iSCSI storage solutions

Support

#1 in enterprise services support

Page 15: Efficiency, effectiveness, productivity: Dell Connected Security in action

Let’s continue the conversation Your challenges drive our capabilities

Page 16: Efficiency, effectiveness, productivity: Dell Connected Security in action

Optimized enterprise

Business-class connected solutions

Flexible, next-gen services

Value-added software

One place for end-to-end solutions

Page 17: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell Security Better security, better business

Page 18: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

Underlying foundation of threats: Basic nature of threats is constant change

• Individual computers

• Modem

• Security

• Firewall 101

• TSRs

• Viruses

• Internet

• Worms

• Trojans

• DOS/ DDOS

• Physical again (Portable media)

1980 1990 2000 2014

Global infrastructure

Individual computers

Individual networks

Multiple networks

Regional networks

• Financial gain

• Espionage - intel gathering

• Nefarious purpose

• Competitive advantage

• Homeland security threats

• Advance Persistent Threat

• Morphing and complex threats

• AI (learn) hacking

• XSS, SQL Injection attacks

• Delivery via Web 2.0 and social networking sites

• Gov’t Healthcare Spam / Phishing

• Watering-hole attacks

• Ransomware

• System hopping malware

• Sophisticated Smartphone Attacks

Page 19: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

Recent attack examples

Page 20: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

Cyber-criminal ecosystem • Increase in criminal-to-criminal activity

1. Exploit auction houses (WabiSabiLabi)

2. Forums and IRC (#Vxers, cybermafia.cc)

3. Distribution service (IFRAMES.BIZ)

4. Botnet rental (5Socks.net)

5. Licensing model (storm worm)

6. Identity auctions (76service)

7. Social networks (ranking and escrow)

Fourth generation

Source: Dell SecureWorks

Page 21: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

#1 74x >

What if Hackers Inc. was a company?

Source: Dell SecureWorks

Page 22: Efficiency, effectiveness, productivity: Dell Connected Security in action

The connected world creates massive opportunity. And IT needs to be the enabler.

Enter new markets

Drive efficiency

Create new products

Use new technologies

Page 23: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

Third Platform Technologies are here

Cloud

Social Mobility

Big Data

Page 24: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

But can introduce known threats...

• Mobile computing has the challenges of malware and phishing

• Cloud computing has the challenges of access and identity, hacking and virtual appliances.

• Social networking has the challenges of privacy and identity theft

• Big data brings the challenges of hacking, ransomware and intrusions leading to mass identity theft.

Page 25: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

For example, the integration of social networking and the cloud will result in social network credentials being used as an element in identity and access management. We are already seeing this trend emerging on the internet, as Twitter and Facebook credentials are used for identification on other platforms. If used as an access and identity element on sites that require high security, this could introduce significant security challenges as the same social credentials are

exposed in less secure environments.

and connected threats…

Page 26: Efficiency, effectiveness, productivity: Dell Connected Security in action

27

Dell - Restricted - Confidential

Risky

Security silos create risk that impedes business innovation

Complexity

Threats Compliance

Lack of Resources

Web 2.0

Virtualization Cloud Mobility

Big Data

Ch

alle

ng

es

Op

po

rtu

nit

ies

Expensive

Inefficient

Page 27: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

Dell delivers a better way, with security that works together across your whole business.

Holistic Proactive

Transparent

Page 28: Efficiency, effectiveness, productivity: Dell Connected Security in action

29

Dell - Restricted - Confidential

The Dell Security difference

Connected end-to-end

Shared, context- aware intelligence

Built for humans

Makes it easy for people to do the

right thing

Stands in the way of threats, not people and

productivity

Enables proactive protection

everywhere

Share real-time threat information

system-wide

Closes gaps, reduces

complexity and mitigates risk

Secure your business from device to

datacenter to cloud

Page 29: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

The result: better security, better business

Enable the enterprise to embrace new technologies faster

than the competition

Comply with regulations and achieve consistent, reliable governance

Protect the whole enterprise –

outside in and inside out – efficiently and proactively

Page 30: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

Delivering best-in-class security solutions

Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov

Security Services Incident Response Managed Security Svcs Security & Risk Consult Threat Intelligence

Data/Endpoint Encryption

Protected Workspace Configuration &

Patch Management Secure Cloud Client

Network Next Gen Firewall

Secure Mobile Access Email Security

Page 31: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

SonicWALL

SecureWorks

Dell One Identity Solutions

Applications Data

DDP|E

Kace Enterprise

BitLocker Manager

Page 32: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

Le

t goo

d gu

ys in

K

eep

bad

guys

out

Del

l Se

curit

y Se

rvic

es

Embe

dded

in

Del

l In

fras

truc

ture

&

Dev

ices

Scalable and Mid-Market design point: endpoint to data center to cloud

Application Security

Network Security

Data & Endpoint Security

Dell SonicWALL

Email Security

Dell KACE Configuration

& Patch Management

Dell SonicWALL

Next-Gen Firewall

Dell Data Protection Encryption

Dell SonicWALL

Mobile Connect

Dell KACE K3000 MDM

Endpoint Network Server Storage Cloud

Dell Managed Security Services

Dell Security & Risk

Consulting Dell Threat Intelligence

Dell Incident Response

Dell Wyse

Cloud Client Manager

Dell One Identity

IAM

Did you know

Dell does Security?

Enstratius (Multi-Cloud Manager) IAM

Dell SonicWALL

Secure Remote

Access (SRA)

*formerly Quest One

Page 33: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

Use case: data security in the cloud

Market trend

Dell Next-Generation Firewalls + Dell Data Protection (Cloud Edition) = Network-enforced encryption

Customer challenges

• Ensure data is encrypted using authorized keys before it leaves the network to be stored or shared in cloud

• Ensure sharing or opening of content is not done by unauthorized users

• Centralize network policy enforcement/ controls • Report on authorized and unauthorized files being

uploaded to cloud

• Growing usage of public cloud storage – users need to share potentially sensitive data

• Compliance requirements demand that data is encrypted before being sent and stored in the cloud

• Lack of enforcement options to protect the organization and the user

Page 34: Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell - Restricted - Confidential

Security leadership, scale and recognition

Validated by the industry •#1 ranked company in Security 500 •“Recommended” by NSS Labs for Firewall & IPS – 3 years in row •Overall Leader in Access Governance, Kuppinger Cole •Best Security Service, Cloud Security, Compliance, Info Security Products Guide •Recommended by SC Magazine •Major Player, Email Security, IDC •6 Gartner Magic Quadrants

60B+ security events

analyzed daily

2M devices WW

reporting on 40m users

Detects 3B security

events of interest daily

Dell SecureWorks

$14 Trillion in assets

protected daily

15,000 malicious

events analyzed

daily

3,000 security

incidents escalated

daily

Over 18 Trillion

applications controlled

Dell SonicWALL

Dell Data Protection Encryption

Data encrypted & protected on 7M devices

Dell Identity and Access

Management 110M

managed identities

2,000+ security

professionals worldwide

Page 35: Efficiency, effectiveness, productivity: Dell Connected Security in action

Securing Dell with Dell – Leveraging our Strengths

• Managed Security Services offering – All Dell firewalls & IPS • Monthly average of 22 billion events – 148 escalations back to Dell IT

Security team for investigation (top 10% of SecureWorks customer base)

• Deployed Secure Mobile Access solution to replace incumbent • Started joint development with firewall business unit

KACE K1000 Management Appliance deployed in Dell’s highly secure, segmented PKI environment for full patch management

Deploying on Dell internal notebooks

• Authentication Services & Recovery Manager • Account provisioning through Dell One Identity Manager

Dell on Dell example

Page 36: Efficiency, effectiveness, productivity: Dell Connected Security in action

Connected Security: Competitive landscape What is our unique positioning?

Security niche providers IT solution providers

They can only address part of the problem. You’re left with no choice but to manage an increased number of vendors’ solutions. This leads to a more complex, expensive and fragmented IT and security environment and presents an intolerable level of risk.

They want to impose a large, complex, rigid and expensive platform on you. They lack Dell’s breadth, requiring integration of multiple solutions from multiple vendors. This means more customization and coding–-all at a greater expense to you.

Dell is the only provider that can protect the entire IT landscape,

enabling both visibility and security from the inside-out, as well as the outside-in. This

simpler, more unified approach scales at your

pace by delivering flexible and modular

solutions.

Limited Expensive & Inflexible Sweet Spot: Comprehensive & Flexible