Protect Breakout: Connected Security for a Connected World



Similar documents
Network Security Solution. Arktos Lam

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Next-Generation Firewalls: Critical to SMB Network Security

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

Dell SonicWALL Portfolio

Jort Kollerie SonicWALL

Why it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager

Q1 Labs Corporate Overview

IBM QRadar Security Intelligence April 2013

Applications erode the secure network How can malware be stopped?

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

How To Buy Nitro Security

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

Achieve Deeper Network Security

Modular Network Security. Tyler Carter, McAfee Network Security

The Hillstone and Trend Micro Joint Solution

Braindumps QA

Achieve Deeper Network Security and Application Control

McAfee - Overview. Anthony Albisser

What to Look for When Evaluating Next-Generation Firewalls

QRadar SIEM and FireEye MPS Integration

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Providing Secure IT Management & Partnering Solution for Bendigo South East College

Clean VPN Approach to Secure Remote Access for the SMB

Clean VPN Approach to Secure Remote Access

OVERVIEW. Enterprise Security Solutions

What is Security Intelligence?

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Check Point Positions

Strengthen security with intelligent identity and access management

QRadar SIEM and Zscaler Nanolog Streaming Service

SonicWALL Security Appliance

The Cisco ASA 5500 as a Superior Firewall Solution

On and off premises technologies Which is best for you?

Forefront Threat Management Gateway (TMG) Whitepaper The Solution.

IBM Security IBM Corporation IBM Corporation

Filling the Threat Management Gateway Void with F5

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Dell SonicWALL Aventail Connect Tunnel User Guide

SourceFireNext-Generation IPS

Meraki: Introduction to Cloud Networking

Dell Software. Introduction and Overview

Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 Colin_Wu1@dell.com

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

Forcepoint Stonesoft Management Center

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

How to Choose the Right Security Information and Event Management (SIEM) Solution

Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention

The Cloud App Visibility Blindspot

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

Firewall Market Trends

#ITtrends #ITTRENDS SYMANTEC VISION

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Astaro Gateway Software Applications

TechNote. Configuring SonicOS for MS Windows Azure

A HELPING HAND TO PROTECT YOUR REPUTATION

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

The ForeScout Difference

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

How To Sell Security Products To A Network Security Company

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Chapter 1 The Principles of Auditing 1

RETHINKING CYBER SECURITY Changing the Business Conversation

REVOLUTIONIZING ADVANCED THREAT PROTECTION

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products.

Security Controls for the Autodesk 360 Managed Services

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

OUR MISSION IS TO PROTECT EVERYONE FROM CYBERCRIME

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Achieving PCI Compliance Using F5 Products

Proven LANDesk Solutions

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

IBM Security QRadar Vulnerability Manager

IBM Security QRadar SIEM Product Overview

IBM Security Intrusion Prevention Solutions

Unified Threat Management, Managed Security, and the Cloud Services Model

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

Securing the Cloud through Comprehensive Identity Management Solution

McAfee Security. Management Client

BeyondInsight Version 5.6 New and Updated Features

Transcription:

Protect Breakout: Connected Security for a Connected World Ramses Gallego Security Strategist and Evangelist Scott Lang Security Solution Marketing Director

Embedded in Dell Infrastructure & Devices Keep bad guys out Let good guys in Dell Security Services Dell Managed Security Services Dell Security & Risk Consulting Dell Threat Intelligence Dell Incident Response Dell One Identity* Identity & Access Management Enstratius (Multi-Cloud Manager) IAM Application Security Dell KACE Configuration & Patch Management Dell SonicWALL Email Security Network Security Dell SonicWALL Secure Remote Access (SRA) Dell SonicWALL SuperMassive Next-Gen Firewall Data & Endpoint Security Dell Data Protection Encryption Dell KACE K3000 MDM Dell Wyse Cloud Client Manager Dell SonicWALL Mobile Connect Did you know DELL does Security? Scalable and Mid-Market design point: endpoint to data center to cloud *formerly Quest One Endpoint Network Server Storage Cloud

Powerful disruptors Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. Big Data 35 By 2020 volume of data stored will reach 35 Zettabytes Mobility 5X Mobility source shifts from 62%/38% corporate/personal owned to 37% corporate owned and 63% personal owned Security and risk 79% of surveyed companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact

The IT journey From mainframe to client server to distributed to risk everywhere

The problem: Layers and silos get the security job done but often have gaps = business risk Individual job done well in silos Solutions often don t work together Solutions don t work across the business Silos and layers add stress to your resources Difficult to get to work together Limited security resources Dell belief: there is a better way

Our point of view: Connected Security for a connected world Security shouldn t slow business down, or lock out productivity only bad guys. Connected Security is security that Shares context & applies intelligence Supports the business Maintains flexibility and open architecture Strikes a balance between performance & protection Effective Protect information everywhere Efficient Work with the business

Dell Connected Security for a connected world Mitigate risks to enable the business, from endpoint to datacenter to cloud Connect security to infrastructure Embed: Security embedded natively into infrastructure Connect security to information Detect & Protect, Respond: Security solutions that gather, analyze, report and act together Connect security to other security solutions Embed, Detect & Protect, Predict, Respond : Security that is no longer siloed Data, User, Network, Application, Services

Dell s approach to Connected Security is comprehensive Network Next Gen Firewall Secure Remote Access Email Security Identity Access Governance Privileged Acct Mgmt Identity Administration User Activity Monitoring Data & Endpoints Data Protection & Encryption Configuration & Patch Management Security Services Incident Response Managed Security Svcs Security & Risk Consult

Identity and access management for the real world Protect critical data with user access controls Access Governance Control & audit superuser access Privileged Account Management Manage the entire lifecycle of identities Identity Administration Monitor user activity & system access; respond to internal threats User Activity Monitoring

Network security without sacrificing performance or productivity Network Security Detect threats & protect the network with next-gen firewalls & unified threat management Secure Remote Access Enable SSL VPN access from virtually any endpoint Email & Web Security Protect against viruses, zombies, spam, phishing & other attacks with multiple threat detection techniques 10

Making Connected Security tangible This week s news New releases collectively gather, analyze, report and act in a proactive way while effectively tackling BYOD, cloud, network security and compliance Dell One Identity Cloud Access Manager new solution that delivers browser-based access through a unified and secure single sign-on, with just-in-time cloud provisioning, federation, authorization and audit capabilities SonicWALL Network Security Appliance (NSA) 2600 leverages the power of more than one million connected sensors around the world so organizations can block the newest threats as they emerge ChangeAuditor 6.0 detects threats and patterns, enabling a rapid response from any device in real time InTrust 10.7 feeds log data into SecureWorks Integrations on display at Dell World

Snapshot - Germany The blue Ravensburger triangle is one of Germany s best-known trademarks. Based in Ravensburg, near Lake Constance in southern Germany, this 1,600 employees company is a leader in the European puzzles and games market. It sells over 8,000 different products internationally, Challenge Company wanted a secure, flexible and scalable solution to make its IT security functionality future-proofed Results Speedy roll-out of the Dell SonicWALL E-Class NSA 5500, NSA series and TZ series at the international locations Flexible, scalable deployment with Dell SonicWALL GMS centralized management Deep Packet Inspection for expanding SSL-encrypted data traffic Software

Snapshot - Switzerland Founded in Switzerland in 1874, the Schindler Group is a leading global provider of elevators, escalators and related services. Behind the company's success are over 45,000 employees in more than 100 countries. Challenge Schindler Group relied on an infrastructure lacking a central IAM/IAG system that was based on a number of different HR systems and 72 different Active Directory Domains. Results The company initiated the transition of existing HR systems into one global HR system as a premise. The Dell IAM processes rely on feeds from this system for both employees and external users Frictionless full visibility and control now in the hands of the right people.

Dell Connected Security proof points 60B+ security events analyzed daily 2m devices WW reporting on 40m users Dell Identity and Access Management Detects 3B security events of interest daily Dell SecureWorks $14 trillion in assets protected daily 102m managed identities 3,000 security incidents escalated daily Over 18 trillion applications controlled Dell SonicWALL Data encrypted and protected on 7m devices Dell Data Protection Encryption 15,000 malicious events analyzed daily Over 2,000 security professionals worldwide; elite security research teams SC Magazine named IAM solution SC Recommended 3 years in a row SuperMassive E10800 earned the coveted 'Recommend' rating in NSS Labs 2013 Next-Generation Firewall Security Value Map for the Second Year in a Row 2M+ security appliances shipped and growing daily!

ability to execute Leadership: Dell security solutions in Gartner Magic Quadrants (2011-2012) challengers leaders LEADERS 2: Managed Security Service Providers (SecureWorks) 2 12 12: Unified Threat Management (SonicWALL) 18: User Administration & Provisioning (Quest One IAM) 22 18 CHALLENGERS, VISIONARIES, NICHE PLAYERS 13: Secure Sockets Layer (SSL) & VPN (SonicWALL) 14 13 14: Enterprise Network Firewalls (SonicWALL) 19 23 15: Secure Email Gateway (SonicWALL) 19: User Authentication (Quest One IAM) 15 niche players visionaries 22: Identity and Access Governance (Quest One IAM) 23: Mobile Data Protection (Dell) completeness of vision

Dell PartnerDirect Software Specialization Tracks Systems Management Information Management Client management Performance monitoring (ETA: 11/1) Virtualization & cloud (ETA: 11/1) Windows server management Database management Security Data Protection Identity & access management Network security To access on-line training: Log-in to www.dell.com/partner. Click Competencies

Security Available 9/1/13 Sales (2/4 individuals, ~2 hr) Two Required Courses: Security Competency Overview - SECC0913WBTS Dell SonicWALL Sales Training - DSW0512WBTS Network Security (SonicWALL) Technical (2/4 individuals, ~2 hr) Two Required Courses: Security Competency Overview - SECC0913WBTS Dell SonicWALL Technical Training - DSWT0512WBTT Cross-sell Optional Network Security Curriculum: KACE Sales/Technical Training Dell Data Protection and Encryption with Credent (Sales) Sales (2/4 individuals, ~2 hr) Two Required Courses: Security Competency Overview - SECC0913WBTS Identity and Access Management Sales Training - IAM0913WBTS Identity and Access Management Technical - (2/4 individuals, ~7-8hr) Three Required Courses: Security Competency Overview - SECC0913WBTS Dell One Identity Manager (Quest One Identity Manager) Technical Training - IDMA0913WBTT Total Privileged Access Management Value Proposition - TPAV0913WBTT

Thank you Thank you