Download presentation
Presentation is loading. Please wait.
Published byBritney Doyle Modified over 9 years ago
1
Dell Connected Security Solutions Simplify & unify
2
2 Confidential Dell Software Trends force changes in the way you do business. A changing IT landscape = security challenges = RISK TRENDS SECURITY CHALLENGES Cloud BYOD Virtualization & new technologies Patchwork of vendor solutions => disjointed & siloed Explosive data growth $ Limited budget and expertise Time & complexity of management & reporting Insufficient visibility and counter measures Compliance Advanced persistent threats, breaches, attacks, malware
3
3 Confidential Global Marketing It’s all about the data
4
4 Confidential Dell Software 20092020 Volume of data stored Zettabytes 0.8 35 Estimated cost to US businesses from data breaches in 2011, (Online Trust Alliance) $6.5B $5.5M Average cost of a data breach in 2011, (Ponemon Institute) New malware samples discovered by researchers every day. (Georgia Tech) 100,000 New malware samples detected by Antivirus solutions, (Cyveillance) 19% 7,000+ New vulnerabilities tracked in 2011 by the Counter Threat Unit
5
5 Confidential Dell Software Data is your competitive advantage It must be protected to maintain business continuity What if a single solution could help you: Respond quickly to security threats and problems before they negatively impact the business? Protect every part of the infrastructure – inside and outside the network – reducing the number of vendors and disparate solutions and gaining efficiencies by reducing costs? Provide common-sense reporting that spans across areas of the network and infrastructure, helping to reduce the risk of errors from missed problems or threats, and saving time? Unify the patchwork of processes, reducing the complexity of meeting security and compliance objectives?
6
6 Confidential Dell Software Dell simplifies & unifies security Connected Security Solutions from Dell reduce risk and help you achieve a simpler, more unified approach to securing critical data and achieving compliance by providing common-sense reporting, unifying threat mitigation and ensuring fast response. Comprehensive coverage Enable users (and the business) Simpler, more unified Inside-out, outside-in protection Built around the pillars of Embed, Detect, Protect and Respond, secure data from the device, to the datacenter, to the cloud. Gather, analyze, inform and act Realize a simpler approach to security, and enable a unified view of security with integrated, industry-leading “best of breed” solutions. Confidently embrace BYOD and the cloud Ensure the secure, compliant use of mobile technologies and the cloud by providing the right access to the right applications regardless of the device.
7
7 Confidential Dell Software 7 Protect sensitive information with user access controls Respond to breaches with quarantine and remediation Embed security into devices and solutions with integrated security Detect and mitigate security risks before they impact your environment Connected Security: Outside-in and inside-out protection, from device to datacenter to cloud Identity Access Governance Privileged Acct Mgmt Identity Administration User Activity Monitoring Security Services Incident Response Managed Security Svcs Security & Risk Consult Data & Endpoints Data Protection & Encryption Network Next Gen Firewall Secure Remote Access Email Dell Quest One Identity Solutions Dell SecureWorks or local Partner Dell Data Protection & Encryption Dell KACE Dell SonicWALL
8
8 Confidential Dell Software Identity and access management for the real world Protect critical data with user access controls Access Governance Control & audit superuser access Privileged Account Management Manage the entire lifecycle of identities Identity Administration Monitor user activity & system access; respond to internal threats User Activity Monitoring
9
9 Confidential Dell Software 9 Network security without sacrificing performance or productivity Detect threats & protect the network with next- gen firewalls & unified threat management Network Security Enable SSL VPN access from virtually any endpoint Secure Remote Access Protect against viruses, zombies, spam, phishing & other attacks with multiple threat detection techniques Email & Web Security
10
10 Confidential Dell Software Endpoint security to protect data and enable users Protect critical data from spyware, spam and viruses Endpoint Security Centralize control of endpoints Endpoint Management & Compliance Protect data wherever it rests with encryption Endpoint Encryption & Data Protection
11
11 Confidential Dell Software 11 Security services detect, protect and respond to emerging threats 24x7x365 Protect the network, safeguarding the perimeter, critical internal assets, data, remote users, customers and partners Managed Security Services Enhance security posture, reduce risk, facilitate compliance and improve operational efficiency Security & Risk Consulting Provide rapid containment and eradication of threats, minimizing the duration and impact of a security breach Incident Response Identify emerging threats, develop countermeasures against new malware and exploits, and protect customers Counter Threat Unit
12
12 Confidential Dell Software Connected Security enables organizations to securely embrace BYOD Establish and enforce access rights – data, resources and roles Manage the device (patch, config, remote lock) Encrypt data wherever it goes Enable secure remote access through SSL VPN Preserve performance with application intelligence Dell Quest One Identity Solutions Dell KACE Dell Data Protection & Encryption Dell SonicWALL Access Application Device
13
13 Confidential Dell Software Connected Security enables organizations to confidently adopt the cloud Dell SecureWorks or local Partner Dell SonicWALL Establish and enforce access rights – data, resources and roles Provide SSO for cloud- based apps Control use of privil- eged credentials Dell Quest One Identity Solutions Secure the data center housing the cloud Enable secure remote access through the cloud from anywhere Improve email security through the cloud Encrypt and decrypt data stored and shared in public cloud storage services Dell KACE Dell Data Protection & Encryption Managed security services Assessments, testing and auditing
14
14 Confidential Dell Software Dell Software solutions Data center & cloud management Client management Performance management Virtualization & cloud mgmt Windows server mgmt Mobile device mgmt Desktop virtualization Application/data access Secure remote access Information management Database management Business intelligence/analytics Application & data integration Big data analytics Mobile workforce management Identity & access management Network security Endpoint security Email security SecurityData protection Enterprise backup/recovery Virtual protection Application protection Disaster recovery
15
Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.