a secure sustainable partnership with unisys · dell safeguard & response (crowdstrike &...
TRANSCRIPT
© Copyright 2019 Dell Inc.1 of YInternal Use - Confidential
OEM | Embedded & Edge Solutions
A Secure Sustainable Partnership with Unisys
“ Better Together ”
• Samantha Cheney Dell EMEA Unisys Account Executive
• Ian Davidson Dell OEM Unisys Account Executive
• Andrew Ness Dell OEM System Engineer
• Tariq Chowdhry Dell System Engineer (Dell Data Protection)
© Copyright 2019 Dell Inc.3 of YInternal Use - Confidential
OEM | Embedded & Edge Solutions
A Secure Sustainable Partnership with Unisys
“ Better Together ”
© Copyright 2019 Dell Inc.4 of YInternal Use - Confidential
“Unisys and Dell Technologies work together to
drive innovation, deliver solutions with global reach,
and provide seamless service for long-term customer
satisfaction. This partnership provides complete, end-
to-end solutions designed even for the most
demanding IT environments”
© Copyright 2019 Dell Inc.5 of YInternal Use - Confidential
Scale SmartReduce costs and complexity.
Innovate FastCompress time to market.
Build BoldCreate better customer experiences
with Tier 1 Technology provider.
DELL TECHNOLOGIES WORKING WITH UNISYS TO EMPOWER THE FUTURE
© Copyright 2019 Dell Inc.6 of YInternal Use - Confidential
Power Requirements
Environmental Requirements
Software Requirements
Software Engineering
Mechanical Engineering
Electrical Engineering
Unifying
software and
hardware…
ENGINEERED TO PERFORMDell Technology engineers work with Unisys to design innovative solutions.
For the best
possible
outcome.
Industry Requirements
CTO-Level Discussions
© Copyright 2019 Dell Inc.7 of YInternal Use - Confidential
Unisys have direct, dedicated access to Dell Technologies’ in-house engineering organization
160 + peopleDEDICATED
to OEMcustomers
Procurement
CTO/Architecture& Design
Engineering
Program/ProjectManagement
ManufacturingOperations
ProductManagement
UNISYS’ VOICEInfluences our product roadmaps and technology vision.
JOINT SUCCESSWith Dell Technologies’ expertise,
capacity, scale and tier 1
technology.
OUR PEOPLEWe sweat the hardware details, letting Unisys focus on their IP, not the hardware launch process.
© Copyright 2019 Dell Inc.8 of YInternal Use - Confidential
ClearPath Software Edition – is an open platform version of the ClearPath operating system that sits in
Windows or VMware and supports Unisys applications
VxRail Hyper-Converged Infrastructure Appliance
© Copyright 2019 Dell Inc.9 of YInternal Use - Confidential
Security throughout
© Copyright 2019 Dell Inc.10 of YInternal Use - Confidential
© Copyright 2019 Dell Inc.11 of YInternal Use - Confidential
Supplier Security
Personnel Security
Cybersecurity
Physical Security
Design Source Build Fulfill Ship
Secure from first mile to last mile — and everywhere in between.
Avert Risk | Protect Reputation | Do Right By Customers
SUPPLY CHAIN
Service
Continuous Monitoring and Improvement
DO YOU KNOW WHERE YOUR SILICON AND FIRMWARE CAME FROM? WE DO.
© Copyright 2019 Dell Inc.12 of YInternal Use - Confidential
How together we protect your infrastructure?
DESIGNED INSecure Infrastructure
Edge Only and Core to Edge
Edge
Dell SafeGuard &
Response(Crowdstrike & Secureworks)
Absolute(Track, Trace, Wipe)
Carbonite(Endpoint Data Protection)
VMware Airwatch(Device Security & Access)
Wyse Thin O/S(Secure, low attack surface)
Edge
Dell SafeBIOS(Resilience, Recovery &
Control)
Dell SafeID(ControlVault, FIPS, Intel
Authenticate)
Dell SafeData(Encryption, Data
Guardian, Services)
Edge Device
Manager(Lockdown, Drift Detection,
Intrusion, Secure Updates)
Core
Core Cyber
Secure Design• Server Secure Boot
• Authenticated
Firmware Updates
• System Lockdown
• Confg. Drift Detection
• Secure Alerting
• Dual Root of Trust
• Instant Secure Erase
Data Protection• Backup & Recovery,
Appliances & Services
• Encryption
• Isolated Recovery
Solution
ENTERPRISE RESPONSEAdvanced Security Operations
Core to Edge
ServiceSoftware
TRANSLATE TO
BUSINESS RISKRisk Management
Central Console
NetWitness
Visibility(Packets, Logs, Edge,
Network Flow.
Intelligence & context)
Analysis(Behavior Analytics, Real-
Time Detection, Archiving)
Action(Incident Management,
Compliance Reporting,
Investigation, Session
reconstruction)
Counter Threat
Platform (CTU) (Advanced active
monitoring of
infrastructure, Managed
Security & Services)
• Countermeasure
Development
• Advisory & Support
• Knowledge Sharing
• Malware Analysis
• Security Innovation
• Specialised Threat
Research
• Vulnerability Analysis
& Management
Archer GRC Platform
Business-level
management of enterprise
Governance, Risk and
Compliance (GRC)
• Mange policies, controls, risks,
assessments and deficiencies from
one central platform.
• Automate Business Processes
• Put Business People in control
• Integrate with external systems for
data analysis, management &
reporting.
The Edge
From the Core to the Edge
13© 2019 Unisys Corporation. All rights reserved. | Dell Customer Communication - Confidential
What’s Driving Cyber Recovery: the Perfect Storm
• 70% of organizations report at least one
damaging security incident1
• Most enterprises (72%) are not ready to
recover from a cyber attack2
• Cyber-attack loss is $2.2 to $6.9 million
per major breach3
• Attackers routinely going after back-ups,
to force ransom payments
• 40% who paid ransoms didn’t get their
data back4
Ransomware time-to-infect
Losses from a single breach
$250M
2019 worldwide ransomware damage
4
1. SecureWorks Ransomware Defense Survey Report, 2017; 2. RSA Cybersecurity Poverty Index, 2016; 3. Forbes, May 13, 2016; 4. CyberEdge, 2018
70
72
2.2
40
© Copyright 2019 Dell Inc.14 of YInternal Use - Confidential
Dell EMC Cyber Recovery with Unisys Stealth
See how Dell EMC Cyber Recovery Vault and Unisys
Stealth® enable Zero Trust backup security for your
last line of defense.
Announced at Dell Technologies World in Vegas!
© Copyright 2019 Dell Inc.15 of YInternal Use - Confidential
© Copyright 2019 Dell Inc.16 of YInternal Use - Confidential
© Copyright 2019 Dell Inc.17 of YInternal Use - Confidential