Jort Kollerie
Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
Big data 35 Volume of data stored Zettabytes -IDC 0.8 2009 2020 4 Confidential
Mobility 5X growth in smartphones and tablets used at work Corporate Corporate Personal Smartphone and tablets used at work % of total customer type and source shifts from 62% / 38% corporate / personal owned to 37% corporate owned and 63% personal owned - IDC, Dell internal analysis 5 Confidential
Security is complex, but it all boils down to two needs Network breach Mobility & Remote workforce Botnets Wireless Security Phishing Trust DLL injection Regulatory Compliance SQL Injection Fines Risky user activity Data-at-Rest Protection Application Vulnerabilities Session Hijacking Asset Loss Interoperability Data-in-Use Consumerization of IT Firewall Protection tunneling Protection of Critical Infrastructure Insider Screen scrapes Premise security threats Hardware Loss Packet Sniffers Worms Trojans User and Device Access Reputation Data-in-Flight Protection Data privacy Fraud Malware Bios Security Rootkit IP Protection Denial of Service Spyware Constrained Budgets Complexity Hackers Internet security User training Passwords Availability Constant change Key logging Cloud security Network Access Control Incident Response Plan Email Security Data Isolation and Separation Security Digital Certificate Spoofing Appliance Online Profiling Asset Tracking Defense-in-Depth Device Management Change Protect sensitive information Management Remote Wipe Digital Forensics Maintain business operations Multi-factor Authentication Biometrics Wireless Security Penetration Testing VPN Digital Cache Wiping Fingerprinting Location Based Services Smart cards (CAC/ PIV) Application Whitelisting Application Patching Security Certification & Accreditation Anti-Virus/ Managed Security Anti-Spam Security Service Assessment Screen Privacy Digital Signing & Hashing Risk Management Code Web Gateway Single-Sign-On Review Cloud provisioning Network Behavior Analysis Firewalls Identity & Access Control Auditing & Reporting Security Education & Training Centralized Policy 6 Confidential
Client & Server Threat Protection 7 Confidential
Inspects all Traffic, Regardless of Port or Protocol 8 Confidential
Inspects Traffic in Multiple Directions 9 Confidential
Normalizes Traffic to Prevent Evasion & Obfuscation 10 Confidential
Monitor & Block Traffic Based on Geographic Origin 11 Confidential
Provide Contextual Awareness Based on User 12 Confidential
Decrypt & Inspect SSL Encrypted Traffic 13 Confidential
Detect and Block Malware Before it Enters the Network 14 Confidential
Detect and Block Communications from Systems that are already Compromised 15 Confidential
Protect the Network from Denial of Service and Flood Attacks 16 Confidential
So, do we have a solution for that? 17 Confidential
packet-by-packet inspection 18 Confidential
An IPS with sophisticated anti-evasion capabilities Dell SuperMassive E10800 earned the highly coveted Recommended rating from NSS Labs in the 2012 and 2013 Intrusion Prevention System (IPS) Security Value Map 19 Confidential
Network-based malware protection that is updated continuously Dell NGFWs have been independently tested and certified for network-based malware protection by ICSA Labs. 20 Confidential
The security of an industry leader The SuperMassive is aptly named... [it] can decrypt SSL traffic very fast in fact these one-off tests show it to be the fastest device by far. 21 Confidential
Dell SuperMassive Series For the second consecutive year, the SuperMassive E10800 has earned the coveted rating of Recommend in NSS Labs 2013 Next-Generation Firewall Security Value Map 22 Confidential
Dell NSA Series Dell NSA series have the same: - architecture - operating system - security engine - security effectiveness 23 Confidential
meanwhile threats and attacks are rising! Dell is ready Are you? 24 Confidential
25 Confidential