mt50 data is the new currency: protect it!
TRANSCRIPT
MT50: Data is the New Currency. Protect it!
Steve Lalla, Sr. VP, Global Ops & End User Computing, Dell
Jeff McNaught, VP of Marketing, Cloud Client-Computing, Dell
Chris Burchett, VP, Cloud Client-Computing Customer Support, Dell
Dave Konetski, Fellow, EUC Technology Solutions, Dell
Dell Security Solutions for the New Age of Mobility
2
Work is happening everywhere… and continuing to evolve
Of employees
expect to be
working in a
smart office
within the next
5 years
57%of employees
see home
technology as
more cutting
edge than
work
technology
35%
of employees
work remotely
at least a few
times per week
and value
balance of
productivity and
quality of life
52%
of Millennials are
more willing to
use AR/VR
products
77%
Of employees
say that remote
teams and better
collaboration
technology will
make F2F
communicatinos
obsolete
51%
3
The way we approach data security must change
1/2of organizations
cite “risk of data
breach as the
biggest mobility
risk.
36% cited the complexity
of using multiple
platforms and
devices.
28% cited limited
technical/IT
resources as the
top barrier to
expanding mobile.
63% of surveyed
organizations have had
one or more advanced
attacks during the past
12 months.
!
4
Why are businesses prioritizing data security?
average amount paid following a security breach, up from $5.4M in 2013.3
The average cost per lost or stolen record increased 6% from $145 the last year to $154. As high as $217 in the US.
increase in records compromised due to a security breach since 2014.2
87% 210%of organizations have experienced a security breach in the last 12 months.1
>175Mrecords have been compromised this year in approximately 591 breaches.2
New malware variants produced daily in 2016.4
105K$154 $5.9M
!
6
Why is security important for end users?
They bring their own apps
They bring their own devices and / or work from uncontrolled locations
They create company data that’s mobile
They are targeted by hackers
7
Where are you?
Security–can your policies & solutions meet today’s threat levels?
People – Have you matched roles to devices and determined access levels?
Management – Will your current solutions & policies be sufficient & cost effective?
Devices – Do you have a strategy to secure devices that access corporate data?
9
Dell Data Security Solutions point of view
Better security, better business. Dell Securityprotects your organization from endpoint todatacenter to cloud, helps you achieve yourmost stringent compliance requirements, and enables people to do more and thrive.
11
Better security is better business
Protect data at-rest on endpoints and in the cloud Encryption
Prevent threats with machine-learning malware
fighting algorithms, ThinOS, and zero clients
Threat Prevention
Restore data from lost, stolen, or damaged endpointsBackup & Recovery
Assure access with integrated authorization options Authentication
Centralize and secure apps and data, managed in
the data center Virtual
Transformational security solutions
12
A suite idea for endpoint data security
.
.
75% of customers prefer to purchase integrated suitesTHREAT
PREVENTIONStops threats within
16 milliseconds
DATA PROTECTIONEncryption for all your endpoints
HARDENED AUTH
Range of integrated authentication
options
SINGLEConsole,
workflow, client agent
Physical endpoints
Virtual endpoints
13
ProtectFIPS 140-2
encryption for data
at-rest
High Efficacy:
99% threats prevented
versus current
industry avg. of 50%
Verified:
Only secure and
verified PC BIOS
Performance:
Minimal CPU usage 1%-
3% preserves system
performance
Endpoint Security Suite Enterprise
Best available Advanced Threat Prevention & Data Protection
14
Adding industry leading capabilities to the portfolio
X`
RSA SecurID Access
RSA NetWitness Endpoint
Vmware AirWatch
Blue, Green, Express
Mozy Pro &
Enterprise
Over 25 years in the marketGartner leader’s quadrant
55 million+ tokens shipped
Multi-factor authenticationSomething you know +
something you have
Time based authentication
Industry leader for Enterprise mobility
management suites
Any device + Any use case + unified management
Low TCO, simpler, flexible
75% of businesses are not confident in their ability to
restore data
Protection in public cloudMultiple restore based options
Behavioral-based Detection of Unique,
Targeted and Unknown
ThreatsRespond in Minutes, not
Months
70-90% of malware samples are unique to
an organization
15
Migrating Apps and Desktops to the Cloud
Protect ContentAll apps and data safely
kept in the secure cloud or
datacenter which includes
auto-backup, DR, etc.
Enable secure mobilityAny device with appropriate
client SW agent can access
all desired apps and content
Control accessSet/enforce apps/data
access from stateless
thin and zero clients
Simplify desktop mgmtVastly simplify download,
upgrade, and patch
processes
Embrace BYODAllow personal device use
and mitigate security risks
with temps & contractors
Reduce energy usageCompact, very low-power
endpoints can be sufficient
for most users
Cloud/ datacenter
hosted apps &
desktops
16
Securely deliver nearly any desktop app to any user on any deviceMove your desktops to the cloud and:
Empower the workforce
Enable BYOD, deliver securely to any device, enhance user collaboration
Optimize IT resources
Reduce IT resources, scale and speed deployment
Improve securityProtect and control data, recover from disasters, apply policies, comply with regulations, and monitor risk
Manage costsMonitor and optimize total cost of ownership, achieve greater utilization from infrastructure assets, reduce energy use
17
Secure by Data Center design
• Centralized Windows apps and
associated data are managed and
protected in the data center.
• Policy-based access control and
multi-level security provides secure
appropriate user level access.
• Built-in data compliance – The
centralization of resources and strict
access control protect against data
loss and meet compliance and
privacy standards.
• ThinOS and zero client endpoints are
virus resistant with no attack surface.
• Advanced multi-factor authentication
with contactless smart cards.
• Ability to lock down device protects
against data theft and introduction of
malware to the network.
• Support for rigorous government
security compliance standards: FIPS
140-2, IPv6, NIST BIOS, and TPM
Ultimate end-point security.
Product shown is the Wyse 3030 thin client
19
Data will move – protect it everywhere
Thumb drives
Companion devices (tablets & smart phones)
Public sync & share clouds
Remote/branch Servers
Data centersPC, Mac, Thin clients
Let’s talk
See demos at the Dell EMC World Expo
• Dell Appliance for Wyse - Citrix
• High Performance Virtual Graphics
• Wyse Thin and Zero Clients
• Dell Endpoint Security Suite Enterprise
• Mozy, RSA, and AirWatch security solutions
Read the product websites and data sheets for additional product details
Engage with our subject matter experts to learn more