Dell Security Solution

advertisement
Dell Connected Security Solutions
Simplify & unify
Trends force changes in the way you do business.
A changing IT landscape = security challenges = RISK
TRENDS
BYOD
Virtualization &
new technologies
2
Confidential
Advanced persistent
threats, breaches, attacks,
malware
Cloud
Explosive data growth
SECURITY
CHALLENGES
Patchwork of vendor
solutions => disjointed &
siloed
$
Limited budget and
expertise
Insufficient visibility and
counter measures
Compliance
Time & complexity of
management & reporting
Dell Software
It’s all about
the data
3
Confidential
Global Marketing
35
Volume
of
Dell
Software
data stored
Zettabytes
0.8
2009
2020
$6.5B
Estimated cost to US
businesses from data
breaches in 2011, (Online
Trust Alliance)
$5.5M
Average cost of a data breach in
2011, (Ponemon Institute)
100,000
19%
New malware samples
discovered by researchers every
day. (Georgia Tech)
New malware samples detected by
Antivirus solutions, (Cyveillance)
7,000+
New vulnerabilities tracked in 2011 by the Counter Threat Unit
4
Confidential
Dell Software
Data is your competitive advantage
It must be protected to maintain business continuity
What if a single solution could help you:
• Respond quickly to security threats and problems before they negatively
impact the business?
• Protect every part of the infrastructure – inside and outside the network –
reducing the number of vendors and disparate solutions and gaining
efficiencies by reducing costs?
• Provide common-sense reporting that spans across areas of the network
and infrastructure, helping to reduce the risk of errors from missed problems
or threats, and saving time?
• Unify the patchwork of processes, reducing the complexity of meeting
security and compliance objectives?
5
Confidential
Dell Software
Dell simplifies & unifies security
Connected Security
Solutions from Dell reduce risk and help you achieve a simpler, more unified
approach to securing critical data and achieving compliance by providing
common-sense reporting, unifying threat mitigation and ensuring fast
response.
Comprehensive coverage
6
Simpler, more unified
Enable users (and the
business)
Inside-out, outside-in
protection
Gather, analyze, inform and act
Confidently embrace BYOD
and the cloud
Built around the pillars of
Embed, Detect, Protect and
Respond, secure data from the
device, to the datacenter, to
the cloud.
Realize a simpler approach to
security, and enable a unified
view of security with integrated,
industry-leading “best of breed”
solutions.
Ensure the secure, compliant
use of mobile technologies and
the cloud by providing the right
access to the right applications
regardless of the device.
Confidential
Dell Software
Connected Security: Outside-in and inside-out protection,
from device to datacenter to cloud
Dell SonicWALL
Detect
Network
and mitigate
Next Gen
security
risksFirewall
before
Securethey
Remote
Access
impact
your
Email
environment
Data & Endpoints
Embed
security
Data Protection
into devices
&
and solutions
Encryption
with
integrated security
Dell Data Protection & Encryption
Dell KACE
7
7
Confidential
Dell Quest One Identity
Solutions
Protect
Identity
sensitive
information
Access Governance
with
user
controls
Privilegedaccess
Acct Mgmt
Identity Administration
User Activity Monitoring
Security Services
Respond
to breaches
Incident
Response
with
quarantineSecurity
Managed
and
Svcs
remediation
Security
& Risk Consult
Dell SecureWorks
or local Partner
Dell Software
Identity and access management for the real world
8
Confidential
Protect critical data with user access controls
Access Governance
Control & audit superuser access
Privileged Account Management
Manage the entire lifecycle of identities
Identity Administration
Monitor user activity & system access; respond to
internal threats
User Activity Monitoring
Dell Software
Network security without sacrificing performance or
productivity
9
Network Security
Detect threats & protect the network with nextgen firewalls & unified threat management
Secure Remote Access
Enable SSL VPN access from virtually any endpoint
Email & Web Security
Protect against viruses, zombies, spam, phishing &
other attacks with multiple threat detection
techniques
Dell Software
Confidential
9
Endpoint security to protect data and enable users
Protect critical data from spyware, spam and viruses Endpoint Security
10
Confidential
Centralize control of endpoints
Endpoint Management &
Compliance
Protect data wherever it rests with encryption
Endpoint Encryption & Data
Protection
Dell Software
Security services detect, protect and respond to emerging
threats 24x7x365
Managed Security Services
Protect the network, safeguarding the perimeter,
critical internal assets, data, remote users,
customers and partners
Security & Risk Consulting
Enhance security posture, reduce risk, facilitate
compliance and improve operational efficiency
Incident Response
Provide rapid containment and eradication of
threats, minimizing the duration and impact of a
security breach
Counter Threat Unit
Identify emerging threats, develop
countermeasures against new malware and
exploits, and protect customers
11
Dell Software
Confidential
11
Connected Security enables organizations to securely
embrace BYOD
Dell SonicWALL
• Enable secure remote
access through SSL VPN
• Preserve performance
with application
intelligence
• Manage the device
(patch, config, remote
lock)
• Encrypt data wherever
it goes
Dell KACE
Dell Data Protection
& Encryption
12
Confidential
Dell Quest One
Identity Solutions
Establish and enforce
access rights – data,
resources and roles
Access
Application
Device
Dell Software
Connected Security enables organizations to confidently
adopt the cloud
Dell SonicWALL
• Secure the data center
housing the cloud
• Enable secure remote
access through the
cloud from anywhere
• Improve email security
through the cloud
Encrypt and decrypt
data stored and shared
in public cloud storage
services
Dell KACE
Dell Data Protection
& Encryption
13
Confidential
Dell Quest One
Identity Solutions
• Establish and enforce
access rights – data,
resources and roles
• Provide SSO for cloudbased apps
• Control use of privileged credentials
• Managed security
services
• Assessments, testing
and auditing
Dell SecureWorks
or local Partner
Dell Software
Dell Software solutions
•
•
•
•
Client management
Performance management
Virtualization & cloud mgmt
Windows server mgmt
•
•
•
•
Database management
Business intelligence/analytics
Application & data integration
Big data analytics
Security
•
•
•
•
14
Confidential
Mobile workforce
management
Information
management
Data center & cloud
management
Identity & access management
Network security
Endpoint security
Email security
•
•
•
•
Mobile device mgmt
Desktop virtualization
Application/data access
Secure remote access
Data protection
•
•
•
•
Enterprise backup/recovery
Virtual protection
Application protection
Disaster recovery
Dell Software
Thank you
Download