mt50 data is the new currency: protect it!

21
MT50: Data is the New Currency. Protect it! Steve Lalla, Sr. VP, Global Ops & End User Computing, Dell Jeff McNaught, VP of Marketing, Cloud Client-Computing, Dell Chris Burchett, VP, Cloud Client-Computing Customer Support, Dell Dave Konetski, Fellow, EUC Technology Solutions, Dell Dell Security Solutions for the New Age of Mobility

Upload: dell-emc-world

Post on 12-Apr-2017

163 views

Category:

Documents


0 download

TRANSCRIPT

MT50: Data is the New Currency. Protect it!

Steve Lalla, Sr. VP, Global Ops & End User Computing, Dell

Jeff McNaught, VP of Marketing, Cloud Client-Computing, Dell

Chris Burchett, VP, Cloud Client-Computing Customer Support, Dell

Dave Konetski, Fellow, EUC Technology Solutions, Dell

Dell Security Solutions for the New Age of Mobility

2

Work is happening everywhere… and continuing to evolve

Of employees

expect to be

working in a

smart office

within the next

5 years

57%of employees

see home

technology as

more cutting

edge than

work

technology

35%

of employees

work remotely

at least a few

times per week

and value

balance of

productivity and

quality of life

52%

of Millennials are

more willing to

use AR/VR

products

77%

Of employees

say that remote

teams and better

collaboration

technology will

make F2F

communicatinos

obsolete

51%

3

The way we approach data security must change

1/2of organizations

cite “risk of data

breach as the

biggest mobility

risk.

36% cited the complexity

of using multiple

platforms and

devices.

28% cited limited

technical/IT

resources as the

top barrier to

expanding mobile.

63% of surveyed

organizations have had

one or more advanced

attacks during the past

12 months.

!

4

Why are businesses prioritizing data security?

average amount paid following a security breach, up from $5.4M in 2013.3

The average cost per lost or stolen record increased 6% from $145 the last year to $154. As high as $217 in the US.

increase in records compromised due to a security breach since 2014.2

87% 210%of organizations have experienced a security breach in the last 12 months.1

>175Mrecords have been compromised this year in approximately 591 breaches.2

New malware variants produced daily in 2016.4

105K$154 $5.9M

!

5

Symptoms of an epidemic

435,000

1:22

77%

205 days

Existing solutions

are NOT

working

6

Why is security important for end users?

They bring their own apps

They bring their own devices and / or work from uncontrolled locations

They create company data that’s mobile

They are targeted by hackers

7

Where are you?

Security–can your policies & solutions meet today’s threat levels?

People – Have you matched roles to devices and determined access levels?

Management – Will your current solutions & policies be sufficient & cost effective?

Devices – Do you have a strategy to secure devices that access corporate data?

8

So how do you balance?

End user demands Data protection

9

Dell Data Security Solutions point of view

Better security, better business. Dell Securityprotects your organization from endpoint todatacenter to cloud, helps you achieve yourmost stringent compliance requirements, and enables people to do more and thrive.

Secure your opportunity

11

Better security is better business

Protect data at-rest on endpoints and in the cloud Encryption

Prevent threats with machine-learning malware

fighting algorithms, ThinOS, and zero clients

Threat Prevention

Restore data from lost, stolen, or damaged endpointsBackup & Recovery

Assure access with integrated authorization options Authentication

Centralize and secure apps and data, managed in

the data center Virtual

Transformational security solutions

12

A suite idea for endpoint data security

.

.

75% of customers prefer to purchase integrated suitesTHREAT

PREVENTIONStops threats within

16 milliseconds

DATA PROTECTIONEncryption for all your endpoints

HARDENED AUTH

Range of integrated authentication

options

SINGLEConsole,

workflow, client agent

Physical endpoints

Virtual endpoints

13

ProtectFIPS 140-2

encryption for data

at-rest

High Efficacy:

99% threats prevented

versus current

industry avg. of 50%

Verified:

Only secure and

verified PC BIOS

Performance:

Minimal CPU usage 1%-

3% preserves system

performance

Endpoint Security Suite Enterprise

Best available Advanced Threat Prevention & Data Protection

14

Adding industry leading capabilities to the portfolio

X`

RSA SecurID Access

RSA NetWitness Endpoint

Vmware AirWatch

Blue, Green, Express

Mozy Pro &

Enterprise

Over 25 years in the marketGartner leader’s quadrant

55 million+ tokens shipped

Multi-factor authenticationSomething you know +

something you have

Time based authentication

Industry leader for Enterprise mobility

management suites

Any device + Any use case + unified management

Low TCO, simpler, flexible

75% of businesses are not confident in their ability to

restore data

Protection in public cloudMultiple restore based options

Behavioral-based Detection of Unique,

Targeted and Unknown

ThreatsRespond in Minutes, not

Months

70-90% of malware samples are unique to

an organization

15

Migrating Apps and Desktops to the Cloud

Protect ContentAll apps and data safely

kept in the secure cloud or

datacenter which includes

auto-backup, DR, etc.

Enable secure mobilityAny device with appropriate

client SW agent can access

all desired apps and content

Control accessSet/enforce apps/data

access from stateless

thin and zero clients

Simplify desktop mgmtVastly simplify download,

upgrade, and patch

processes

Embrace BYODAllow personal device use

and mitigate security risks

with temps & contractors

Reduce energy usageCompact, very low-power

endpoints can be sufficient

for most users

Cloud/ datacenter

hosted apps &

desktops

16

Securely deliver nearly any desktop app to any user on any deviceMove your desktops to the cloud and:

Empower the workforce

Enable BYOD, deliver securely to any device, enhance user collaboration

Optimize IT resources

Reduce IT resources, scale and speed deployment

Improve securityProtect and control data, recover from disasters, apply policies, comply with regulations, and monitor risk

Manage costsMonitor and optimize total cost of ownership, achieve greater utilization from infrastructure assets, reduce energy use

17

Secure by Data Center design

• Centralized Windows apps and

associated data are managed and

protected in the data center.

• Policy-based access control and

multi-level security provides secure

appropriate user level access.

• Built-in data compliance – The

centralization of resources and strict

access control protect against data

loss and meet compliance and

privacy standards.

• ThinOS and zero client endpoints are

virus resistant with no attack surface.

• Advanced multi-factor authentication

with contactless smart cards.

• Ability to lock down device protects

against data theft and introduction of

malware to the network.

• Support for rigorous government

security compliance standards: FIPS

140-2, IPv6, NIST BIOS, and TPM

Ultimate end-point security.

Product shown is the Wyse 3030 thin client

19

Data will move – protect it everywhere

Thumb drives

Companion devices (tablets & smart phones)

Public sync & share clouds

Remote/branch Servers

Data centersPC, Mac, Thin clients

Let’s talk

See demos at the Dell EMC World Expo

• Dell Appliance for Wyse - Citrix

• High Performance Virtual Graphics

• Wyse Thin and Zero Clients

• Dell Endpoint Security Suite Enterprise

• Mozy, RSA, and AirWatch security solutions

Read the product websites and data sheets for additional product details

Engage with our subject matter experts to learn more