protect breakout: connected security for a connected world · •new releases collectively gather,...

18
Protect Breakout: Connected Security for a Connected World Ramses Gallego Security Strategist and Evangelist Scott Lang Security Solution Marketing Director

Upload: others

Post on 14-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Protect Breakout: Connected Security for a Connected World

Ramses Gallego Security Strategist and Evangelist

Scott Lang Security Solution Marketing Director

Page 2: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

L

et

go

od

g

uy

s in

K

ee

p b

ad

g

uy

s o

ut

De

ll

Se

cu

rity

S

erv

ice

s

Em

be

dd

ed

in

De

ll

Infr

ast

ruc

ture

&

De

vic

es

Scalable and Mid-Market design point: endpoint to data center to cloud

Application Security

Network Security

Data & Endpoint Security

Dell SonicWALL

Email Security

Dell KACE Configuration

& Patch Management

Dell SonicWALL

SuperMassive

Next-Gen Firewall

Dell Data Protection Encryption

Dell SonicWALL

Mobile Connect

Dell KACE K3000 MDM

Endpoint Network Server Storage Cloud

Dell Managed Security Services

Dell Security & Risk

Consulting

Dell Threat Intelligence

Dell Incident Response

Dell Wyse Cloud Client

Manager

Dell One Identity*

Identity & Access Management

Did

yo

u kn

ow

DE

LL d

oes S

ecu

rity?

Enstratius (Multi-Cloud Manager) IAM

Dell SonicWALL

Secure Remote

Access (SRA)

*formerly Quest One

Page 3: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Security and risk

of surveyed companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact

79%

of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years.

85% Cloud

Mobility Mobility source shifts from 62%/38% corporate/personal owned to 37% corporate owned and 63% personal owned

5X

Big Data By 2020 volume of data stored will reach 35 Zettabytes 35

Powerful disruptors

Page 4: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

The IT journey…

From mainframe to client server to distributed to risk everywhere

Page 5: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Dell belief: there is a better way

Silos and layers add stress to your resources • Difficult to get to work together • Limited security resources

Individual job done well in silos • Solutions often don’t work together • Solutions don’t work across

the business

The problem: Layers and silos get the security job done but often have gaps = business risk

Page 6: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Our point of view: Connected Security for a connected world

Connected Security is security that…

• Shares context & applies intelligence

• Supports the business

• Maintains flexibility and open architecture

• Strikes a balance between performance & protection

Security shouldn’t

slow business down, or lock out

productivity…only bad

guys.

Protect information everywhere

Effective

Work with the business

Efficient

Page 7: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Dell Connected Security for a connected world

Mitigate risks to enable the business, from endpoint to datacenter to cloud

Detect & Protect, Respond: Security solutions that gather, analyze, report and act together

Embed: Security embedded natively into infrastructure

Embed, Detect & Protect, Predict, Respond : Security that is no longer siloed…Data, User, Network, Application, Services

Connect security to infrastructure

Connect security to information

Connect security to other security

solutions

Page 8: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Dell’s approach to Connected Security is comprehensive

Identity Access Governance Privileged Acct Mgmt Identity Administration User Activity Monitoring

Security Services Incident Response Managed Security Svcs Security & Risk Consult

Data & Endpoints Data Protection &

Encryption Configuration &

Patch Management

Network Next Gen Firewall

Secure Remote Access Email Security

Page 9: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Identity and access management for the real world

Protect critical data with user access controls

Access Governance

Control & audit superuser access Privileged Account Management

Manage the entire lifecycle of identities Identity Administration

Monitor user activity & system access; respond to internal threats

User Activity Monitoring

Page 10: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

10

Network security without sacrificing performance or productivity

Detect threats & protect the network with next-gen firewalls & unified threat management

Network Security

Enable SSL VPN access from virtually any endpoint Secure Remote Access

Protect against viruses, zombies, spam, phishing & other attacks with multiple threat detection techniques

Email & Web Security

Page 11: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Making Connected Security tangible

This week’s news

• New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud, network security and compliance – Dell One Identity Cloud Access Manager new solution that

delivers browser-based access through a unified and secure single sign-on, with just-in-time cloud provisioning, federation, authorization and audit capabilities

– SonicWALL Network Security Appliance (NSA) 2600 leverages the power of more than one million connected sensors around the world so organizations can block the newest threats as they emerge

– ChangeAuditor 6.0 detects threats and patterns, enabling a rapid response from any device in real time

– InTrust 10.7 feeds log data into SecureWorks

• Integrations on display at Dell World

Page 12: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Software

Snapshot - Germany The blue Ravensburger triangle is one of Germany’s best-known trademarks. Based in Ravensburg, near Lake Constance in southern Germany, this 1,600 employees company is a leader in the European puzzles and games market. It sells over 8,000 different products internationally, Challenge Company wanted a secure, flexible and scalable solution to make its IT security functionality future-proofed Results • Speedy roll-out of the Dell

SonicWALL E-Class NSA 5500, NSA series and TZ series at the international locations

• Flexible, scalable deployment with Dell SonicWALL GMS centralized management

• Deep Packet Inspection for expanding SSL-encrypted data traffic

Page 13: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Snapshot - Switzerland Founded in Switzerland in 1874, the Schindler Group is a leading global provider of elevators, escalators and related services. Behind the company's success are over 45,000 employees in more than 100 countries. Challenge Schindler Group relied on an infrastructure lacking a central IAM/IAG system that was based on a number of different HR systems and 72 different Active Directory Domains. Results • The company initiated the transition of

existing HR systems into one global HR system as a premise. The Dell IAM processes rely on feeds from this system for both employees and external users

• Frictionless full visibility and control now in the hands of the right people.

Page 14: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

60B+ security events

analyzed daily

2m devices WW

reporting on 40m users

Detects 3B security

events of interest daily

Dell SecureWorks

$14 trillion in assets

protected daily

15,000 malicious

events analyzed

daily

3,000 security incidents escalated

daily

Over 18 trillion applications controlled

Dell SonicWALL

Dell Data Protection Encryption

Data encrypted

and protected on 7m devices

Dell Identity and Access

Management

102m managed identities

Dell Connected Security proof points

• Over 2,000 security professionals worldwide; elite security research teams

• SC Magazine named IAM solution “SC Recommended” 3 years in a row

• SuperMassive E10800 earned the coveted 'Recommend' rating in NSS Labs 2013 Next-Generation Firewall Security Value Map for the Second Year in a Row

• 2M+ security appliances shipped… and growing daily!

Page 15: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

ab

ilit

y t

o e

xe

cu

te

completeness of vision

15

14

2

challengers leaders

niche players visionaries

12

13

19

22

23

18

LEADERS

2: Managed Security Service Providers (SecureWorks)

12: Unified Threat Management (SonicWALL)

18: User Administration & Provisioning (Quest One IAM)

CHALLENGERS, VISIONARIES, NICHE PLAYERS

13: Secure Sockets Layer (SSL) & VPN (SonicWALL)

14: Enterprise Network Firewalls (SonicWALL)

15: Secure Email Gateway (SonicWALL)

19: User Authentication (Quest One IAM)

22: Identity and Access Governance (Quest One IAM)

23: Mobile Data Protection (Dell)

Leadership: Dell security solutions in Gartner Magic Quadrants (2011-2012)

Page 16: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Systems Management

• Client management

• Performance monitoring (ETA: 11/1)

• Virtualization & cloud (ETA: 11/1)

• Windows server management

Information Management

• Database management

• Identity & access management

• Network security

Security Data Protection

To access on-line training: Log-in to www.Dell.com/partner. Click “Competencies”

Dell PartnerDirect – Software Specialization Tracks

Page 17: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Security – Available 9/1/13

Network Security (SonicWALL)

Sales (2/4 individuals, ~2 hr)

• Two Required Courses:

• Security Competency Overview - SECC0913WBTS

• Dell SonicWALL Sales Training - DSW0512WBTS

Technical (2/4 individuals, ~2 hr)

• Two Required Courses:

• Security Competency Overview -

SECC0913WBTS

• Dell SonicWALL Technical Training -

DSWT0512WBTT

Identity and Access Management Sales (2/4 individuals, ~2 hr)

• Two Required Courses:

• Security Competency Overview - SECC0913WBTS

• Identity and Access Management Sales Training - IAM0913WBTS

Technical - (2/4 individuals, ~7-8hr)

• Three Required Courses:

• Security Competency Overview - SECC0913WBTS

• Dell One Identity Manager (Quest One Identity Manager) Technical Training - IDMA0913WBTT

• Total Privileged Access Management Value Proposition - TPAV0913WBTT

Cross-sell Optional Network Security Curriculum: • KACE Sales/Technical Training • Dell Data Protection and Encryption with Credent (Sales)

Page 18: Protect Breakout: Connected Security for a Connected World · •New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud,

Thank you

Thank you