efficiency, effectiveness, productivity: dell connected security in action
TRANSCRIPT
Welcome! Delldirekte.no/DellST14
Dell Solutions Tour 2014
We welcome you together with our partners!
Dell Solutions Tour 2014
Dell Solutions Tour 2014
Dell Solutions Tour 2014
Connect with us
@DellLytter @DellDirekte
http://www.linkedin.com/company/dell
https://www.facebook.com/DellNorway
DellDirekte.no
#DellST14
Delldirekte/DellST14
Dell Solutions Tour 2014
The Dell Advantage
Florian Malecki
International Product Marketing Director – Dell Security
The Dell Advantage Presenter name Presenter title Date
What if….
Making technology more accessible Giving organizations of any size the power to do more
Dell Solutions Tour 2014
Practical innovation Our Research & Development strategy
• Best-of-breed platforms
• Organic innovation • Integration across
all elements
Build
• Joint product and solution engineering and testing
• Common strategic roadmaps
Partner
• $18 billion and 20 acquisitions
• Full adherence to the Dell design philosophy
Acquire
The intersection of traditional and new IT
Ready for tomorrow
Optimized for today
Dell Solutions Tour 2014
Standards-based No deliberate proprietary lock in
Dell is different Reach your full potential without limitations
Modern platforms No vested interest in legacy systems
End-to-end solutions No siloed viewpoint or hidden agenda
Flexible scaling No forced constraints or rip-and-replace
Modular systems No costly monolithic stacks
Open approach No intentionally closed ecosystems
Dell Solutions Tour 2014
Leadership that benefits every customer Making powerful technology more accessible and affordable
Search
4 of 5 top search engines worldwide powered by Dell
Data center
#1 provider of virtualized data center infrastructure
Social
3 of 4 top social media websites are powered by Dell
Cloud
#1 provider of cloud infrastructure—over 1M servers shipped
Software
90% of Fortune 1000 companies use Dell software
Servers
#1
server provider in North America, Latin America, China
Storage
#1 provider of iSCSI storage solutions
Support
#1 in enterprise services support
Let’s continue the conversation Your challenges drive our capabilities
Optimized enterprise
Business-class connected solutions
Flexible, next-gen services
Value-added software
One place for end-to-end solutions
Dell Security Better security, better business
Dell - Restricted - Confidential
Underlying foundation of threats: Basic nature of threats is constant change
• Individual computers
• Modem
• Security
• Firewall 101
• TSRs
• Viruses
• Internet
• Worms
• Trojans
• DOS/ DDOS
• Physical again (Portable media)
1980 1990 2000 2014
Global infrastructure
Individual computers
Individual networks
Multiple networks
Regional networks
• Financial gain
• Espionage - intel gathering
• Nefarious purpose
• Competitive advantage
• Homeland security threats
• Advance Persistent Threat
• Morphing and complex threats
• AI (learn) hacking
• XSS, SQL Injection attacks
• Delivery via Web 2.0 and social networking sites
• Gov’t Healthcare Spam / Phishing
• Watering-hole attacks
• Ransomware
• System hopping malware
• Sophisticated Smartphone Attacks
Dell - Restricted - Confidential
Recent attack examples
Dell - Restricted - Confidential
Cyber-criminal ecosystem • Increase in criminal-to-criminal activity
1. Exploit auction houses (WabiSabiLabi)
2. Forums and IRC (#Vxers, cybermafia.cc)
3. Distribution service (IFRAMES.BIZ)
4. Botnet rental (5Socks.net)
5. Licensing model (storm worm)
6. Identity auctions (76service)
7. Social networks (ranking and escrow)
Fourth generation
Source: Dell SecureWorks
Dell - Restricted - Confidential
#1 74x >
What if Hackers Inc. was a company?
Source: Dell SecureWorks
The connected world creates massive opportunity. And IT needs to be the enabler.
Enter new markets
Drive efficiency
Create new products
Use new technologies
Dell - Restricted - Confidential
Third Platform Technologies are here
Cloud
Social Mobility
Big Data
Dell - Restricted - Confidential
But can introduce known threats...
• Mobile computing has the challenges of malware and phishing
• Cloud computing has the challenges of access and identity, hacking and virtual appliances.
• Social networking has the challenges of privacy and identity theft
• Big data brings the challenges of hacking, ransomware and intrusions leading to mass identity theft.
Dell - Restricted - Confidential
For example, the integration of social networking and the cloud will result in social network credentials being used as an element in identity and access management. We are already seeing this trend emerging on the internet, as Twitter and Facebook credentials are used for identification on other platforms. If used as an access and identity element on sites that require high security, this could introduce significant security challenges as the same social credentials are
exposed in less secure environments.
and connected threats…
27
Dell - Restricted - Confidential
Risky
Security silos create risk that impedes business innovation
Complexity
Threats Compliance
Lack of Resources
Web 2.0
Virtualization Cloud Mobility
Big Data
Ch
alle
ng
es
Op
po
rtu
nit
ies
Expensive
Inefficient
Dell - Restricted - Confidential
Dell delivers a better way, with security that works together across your whole business.
Holistic Proactive
Transparent
29
Dell - Restricted - Confidential
The Dell Security difference
Connected end-to-end
Shared, context- aware intelligence
Built for humans
Makes it easy for people to do the
right thing
Stands in the way of threats, not people and
productivity
Enables proactive protection
everywhere
Share real-time threat information
system-wide
Closes gaps, reduces
complexity and mitigates risk
Secure your business from device to
datacenter to cloud
Dell - Restricted - Confidential
The result: better security, better business
Enable the enterprise to embrace new technologies faster
than the competition
Comply with regulations and achieve consistent, reliable governance
Protect the whole enterprise –
outside in and inside out – efficiently and proactively
Dell - Restricted - Confidential
Delivering best-in-class security solutions
Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov
Security Services Incident Response Managed Security Svcs Security & Risk Consult Threat Intelligence
Data/Endpoint Encryption
Protected Workspace Configuration &
Patch Management Secure Cloud Client
Network Next Gen Firewall
Secure Mobile Access Email Security
Dell - Restricted - Confidential
SonicWALL
SecureWorks
Dell One Identity Solutions
Applications Data
DDP|E
Kace Enterprise
BitLocker Manager
Dell - Restricted - Confidential
Le
t goo
d gu
ys in
K
eep
bad
guys
out
Del
l Se
curit
y Se
rvic
es
Embe
dded
in
Del
l In
fras
truc
ture
&
Dev
ices
Scalable and Mid-Market design point: endpoint to data center to cloud
Application Security
Network Security
Data & Endpoint Security
Dell SonicWALL
Email Security
Dell KACE Configuration
& Patch Management
Dell SonicWALL
Next-Gen Firewall
Dell Data Protection Encryption
Dell SonicWALL
Mobile Connect
Dell KACE K3000 MDM
Endpoint Network Server Storage Cloud
Dell Managed Security Services
Dell Security & Risk
Consulting Dell Threat Intelligence
Dell Incident Response
Dell Wyse
Cloud Client Manager
Dell One Identity
IAM
Did you know
Dell does Security?
Enstratius (Multi-Cloud Manager) IAM
Dell SonicWALL
Secure Remote
Access (SRA)
*formerly Quest One
Dell - Restricted - Confidential
Use case: data security in the cloud
Market trend
Dell Next-Generation Firewalls + Dell Data Protection (Cloud Edition) = Network-enforced encryption
Customer challenges
• Ensure data is encrypted using authorized keys before it leaves the network to be stored or shared in cloud
• Ensure sharing or opening of content is not done by unauthorized users
• Centralize network policy enforcement/ controls • Report on authorized and unauthorized files being
uploaded to cloud
• Growing usage of public cloud storage – users need to share potentially sensitive data
• Compliance requirements demand that data is encrypted before being sent and stored in the cloud
• Lack of enforcement options to protect the organization and the user
Dell - Restricted - Confidential
Security leadership, scale and recognition
Validated by the industry •#1 ranked company in Security 500 •“Recommended” by NSS Labs for Firewall & IPS – 3 years in row •Overall Leader in Access Governance, Kuppinger Cole •Best Security Service, Cloud Security, Compliance, Info Security Products Guide •Recommended by SC Magazine •Major Player, Email Security, IDC •6 Gartner Magic Quadrants
60B+ security events
analyzed daily
2M devices WW
reporting on 40m users
Detects 3B security
events of interest daily
Dell SecureWorks
$14 Trillion in assets
protected daily
15,000 malicious
events analyzed
daily
3,000 security
incidents escalated
daily
Over 18 Trillion
applications controlled
Dell SonicWALL
Dell Data Protection Encryption
Data encrypted & protected on 7M devices
Dell Identity and Access
Management 110M
managed identities
2,000+ security
professionals worldwide
Securing Dell with Dell – Leveraging our Strengths
• Managed Security Services offering – All Dell firewalls & IPS • Monthly average of 22 billion events – 148 escalations back to Dell IT
Security team for investigation (top 10% of SecureWorks customer base)
• Deployed Secure Mobile Access solution to replace incumbent • Started joint development with firewall business unit
KACE K1000 Management Appliance deployed in Dell’s highly secure, segmented PKI environment for full patch management
Deploying on Dell internal notebooks
• Authentication Services & Recovery Manager • Account provisioning through Dell One Identity Manager
Dell on Dell example
Connected Security: Competitive landscape What is our unique positioning?
Security niche providers IT solution providers
They can only address part of the problem. You’re left with no choice but to manage an increased number of vendors’ solutions. This leads to a more complex, expensive and fragmented IT and security environment and presents an intolerable level of risk.
They want to impose a large, complex, rigid and expensive platform on you. They lack Dell’s breadth, requiring integration of multiple solutions from multiple vendors. This means more customization and coding–-all at a greater expense to you.
Dell is the only provider that can protect the entire IT landscape,
enabling both visibility and security from the inside-out, as well as the outside-in. This
simpler, more unified approach scales at your
pace by delivering flexible and modular
solutions.
Limited Expensive & Inflexible Sweet Spot: Comprehensive & Flexible