stopping threats in real time with dell data security ...€¦ · protecting data from external and...

17
Stopping Threats in Real Time with Dell Data Security Solutions

Upload: others

Post on 28-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Stopping Threats in

Real Time with

Dell Data Security

Solutions

Page 2: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

2

As mobility, productivity and flexibility increase in the workplace, so do security challenges.

Protecting data from external and internal threats

Trade off between workforce innovation and security

Too many vendors, consoles agents; not efficient, not secure

Page 3: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

End users are the greatest security challenge

3

Employees willing to

share confidential data

externally.

Employees frequently

open emails from

unknown senders.

Employees use

corporate-issued devices

to access personal social

media accounts.

1 in 3

72%

49%Employees report using

public cloud sharing

services.

56%

Data breaches

originate with

endpoints.

95%

Page 4: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Attackers are winning on the endpoint

99%

of malware samples are unique

to an organization290%

of cases took just minutes to

compromise an endpoint193%

of end-users in incidents

opened phishing emails130%

TIME TO DISCOVERY

TIME TO COMPROMISE

Source: Verizon 2016 Data Breach Investigations Report

100%

75%

50%

25%

2006 ---------------------------- YEAR ---------------------------- 2015

%,

wh

ere

“d

ay

s o

r le

ss

of malware hashes are seen for

only 58 seconds or less1

Page 5: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Reduce endpoint

comprises Prevent

Threats

Protect

Data

Secure the data

itself, everywhere

Protect data on the

endpointsDetect anomalous

behavior

Control access to

online assets

Endpoint security requires:

Recover lost data

Effective management

of endpoints

Self-healing visibility

and remediation

Page 6: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Prevent

Threats

Machine learning for effective threat prevention

Detect and respond to anomalous endpoint behavior

Address credential theft, with multi-factor authentication

Prepare for worse with continuous cloud-based backup

Page 7: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Advanced Threat Prevention

• Machine learning with pre-

execution prevention

• Reduced device impact

• Lower management overhead

Staying ahead of evolving threats, exceeding

compliance; simply

Endpoint Security Suite Enterprise

Device Security

• Host based firewall

• Web protection

• Content filtering (3Q)

Endpoint Encryption

• Centrally managed / flexible options

• File-encryption: more efficient |

secure

• Seamless remote media protection

• Bitlocker management

Powered by:

Page 8: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Single management console for all policies

Flexible

encryption options

ATP and client

protection

Seamless removable

encryption

External data security

Page 9: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Protect

Data

Pre-execution protection

Efficiently exceed compliance with

at-rest data encryption

Simplified device management for all

your endpoints

See and secure data and services, on

and off network

Secure data everywhere, in any state

Page 10: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Protecting data – existing approach

creates a “wall” around

the network to prevent

data from escaping the

protected company

network.

Documents shared with partners

But data WILL escape…

Documents provided to temporary employees

Employees use cloud share, moving to

personal devices, using public WiFi

Data Loss Prevention

Page 11: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Protecting data — the future

With Dell Data Guardian, the focus shifts to securing the data itself.

All data carries its individual encryption and policy,

making it self-protecting data.

Protect data,

wherever it goes

Control who gets

access to data

Monitor data activity

and location

Page 12: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Securing data wherever it is

The data

guardian

experience

You send a

file to a

collaborator.

!

Protect your data

wherever it goes.

Control who gets

access to your data.

Monitor data activity

and location.

Encrypt data at rest

and on the move.

Control collaborator’s

access and

interaction with the

file.

Detailed information on file usage provides actionable insights.

Page 13: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

The data guardian workflow— A Closer Look

Policy-Based Permission

IT defines policy for

different job-functions

with all keys centrally managed.

1 Minimal Employee Friction

Employee initiates

send to external

party – prompt to confirm

distribution within Outlook.

2

Efficient 3rd Party Access

Targeted recipient accesses

doc after simple one-time

registration with agent

download or HTML5 viewer.

3 Maintain Control

Recipient can edit and save, but policy defines rights mgmt(exp/ embargo, copy/ paste, print, send).

!

4

Monitor and

Protect

IT track and audit all

events (data can be

exported SIEM).

Revoke rights if threat

is detected.

5

Page 14: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Endpoint Security

Suite Enterprise Prevent

Threats

Protect

Data

Data Guardian

EncryptionThreat Defense

NetWitness

Endpoint & SecurID

Dell offers best-in-class endpoint data security and management

Intel® Authenticate

Page 15: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Leading endpoint security partner

Integrating portfolio with:

• Single purchase path

• Integrated support

• Threat information sharing

• Simplified management

Intel® Authenticate

Page 16: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees

Solutions built to address

today’s security environment

Transparent protection

of mobile, collaborative

end users

Simplified,

integrated

inter-operability,

from one partner

Why Dell data security?

Page 17: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees