Presentation is loading. Please wait.

Presentation is loading. Please wait.

DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable.

Similar presentations


Presentation on theme: "DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable."— Presentation transcript:

1 DATS Portfolio

2 PARTNERS & Solutions

3 END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable Intel Xeon processor performance with value that reduces the cost of your most critical functions. Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable Intel Xeon processor performance with value that reduces the cost of your most critical functions. Lenovo System x Family: Rack and Tower Servers Mission-Critical Servers Converged/Blades Solutions Dense Computing Systems Entry, Midrange & High-end Storage

4  Data Domain  VxRail  Unity Scalable, reliable, and cloud- enabled protection storage for cost-effective backup, archive, and disaster recovery Unity family delivers the ultimate in simplicity, high-performance and efficient midrange unified storage, hybrid or All-Flash. VxRail for a balance of performance and cost in hyper-converged infrastructure appliances for VMware environments. Optimize the performance and availability of databases, applications, and data centers with EMC solutions to maximize ROI on IT infrastructure. Technology and Solutions for Modern Data Center

5 Leading IT Business Intelligence End User Computing Successful Platform Continuous End User Analytics Asset Optimization & Rationalization Incident Response & Diagnostics VDI assessment, Design and Planning

6 Hyper-Converged Solution Accelerate Performance by 10 X Increase Storage Efficiency By 10 X Accelerate Performance by 10 X Increase Storage Efficiency By 10 X ALL FLASH PERFORMANCE 50%-90% LOWER COST FREEDOM OF CHOICE MODULAR SCALABILITY Software - Defined Storage Changing Economics of Storage in Modern Data Center

7 Security Products “Leading security solutions for banking sector, government, business and other industries”

8 Leader in Endpoint Protection  All-in-one security package, easy to use, light on memory: Antivirus, Antimalware, … Email & web traffic filtering. Connection control.  Efficient central policy management & control device.  Active Directory integration.  Proxy servers implementation to reduce network traffic.  Software updater for non F-Secure products.

9 Data Leak Prevention (DLP) Group Policy-Integrated and Data Leak Prevention (DLP) for Protecting Data. Prevent devastating data leaks by monitoring, securing & controlling all endpoints in a network. Provides both contextual and content based controls. Detect and block hardware key loggers. Auditing, Shadowing & Alerting. Host-Resident OCR. Clipboard & printing Control, USB, Media, Protocols, Mobile Device, … White List. Removable Media Encryption Integration. Tamper Protection. DeviceLock Key Features

10 NetIQ an American software company, lately owned by Micro Focus International, leading in Security Software for 35 years, with large implementations worldwide. A family of 31 products concentrating on: Identity and Access Management Security Management IT Operation Management Workload Migration Disaster recovery Unified Communication/VoIP

11 Efficient SIEM solution by combining real-time intelligence, anomaly detection and user activity monitoring to provide an early-warning mechanism and a more accurate assessment of IT activities. Security Monitoring for Network Security, Host, Access, User and Privileged User to monitor tens of thousands of events everyday. Compliance by providing evidence, in the form of reporting, that can be used to prove compliance with a given control. NetIQ - Sentinel The information you need at your fingertips Detects new threats quickly and easily Greater visibility into user activities Log management  Real-time analytics via the Correlation Engine and Security Intelligence  Full incident handling and incident response workflow built-in  Real-time visibility of IT activities to mitigate security threats.  Automatically enforce policy controls across physical, virtual and cloud environments. Key Features:

12 NetIQ - Secure Configuration Manager Configuration assessment & compliance management  Risk Management and Compliance Enforcement in an IT environment.  Continuous process for detecting, alerting, reporting and managing security vulnerability.  Policy and best practice configuration assessment  Automated compliance reporting  File system and AD entitlement reporting  Configuration risk and compliance dashboard  SCM proactively enforce security configuration policy across critical systems in evolving IT environments.  Demonstrate compliance and protect sensitive assets from internal and external attack with automated configuration assessment of critical systems in accordance with regulatory requirements and security policies. Keys Differentiators:

13 NetIQ - Privileged Account Manager (PAM)  Secure Privileged Account Access to databases, applications, and cloud environments  Manages, controls and records privileged account activities for all credential-based systems Privileged user management Database privileged account monitoring Risk-based privileged session control Secured password vaulting Grant only the privileges users need, when they need them. Centrally define and enforce the commands that privileged users are able to execute on any credential-based system. Know what your privileged users are doing with the rights they have to business-critical databases. Powerful risk-analysis tools record and play back user activity down to the keystroke level. Define high-risk activity controls and enforce them with automatic session termination or access revocation The Enterprise Credential Vault is an encrypted and hardened “password vault” to store credentials, keys, and other secret information.

14 NetIQ - Change Guardian  Security intelligence to rapidly identify and respond to privileged user activities that could signal a data breach or result in compliance gaps.  Real time response to potential threats through intelligent alerting of unauthorized access and changes to critical files, systems and applications. Privileged-user monitoring Real-time change monitoring Real-time intelligent alerting Compliance and best practices attainment Capabilities:

15


Download ppt "DATS Portfolio. PARTNERS & Solutions END TO END DATA CENTER SOLUTIONS Building a robust, resilient IT infrastructure. Lenovo System x combines unbeatable."

Similar presentations


Ads by Google