stopping threats in real time with dell data security ... · as mobility, productivity and...
TRANSCRIPT
Stopping Threats in
Real Time with
Dell Data Security
Solutions
2
2
As mobility, productivity and flexibility increase in the workplace, so do security challenges.
Protecting data from external and internal threats
Trade off between workforce innovation and security
Too many vendors, consoles agents; not efficient, not secure
End users are the greatest security challenge
3
Employees willing to
share confidential data
externally*.
Employees frequently
open emails from
unknown senders*.
Employees use
corporate-issued devices
to access personal social
media accounts*.
1 in 3
72%
49%Employees report using
public cloud sharing
services*.
56%
Data breaches
originate at the
endpoints1.
95%
4
Attackers are winning on the endpoint
99%
of malware samples are unique
to an organization290%
of cases took just minutes to
compromise an endpoint193%
of end-users in incidents
opened phishing emails130%
TIME TO DISCOVERY
TIME TO COMPROMISE
Source: Verizon 2016 Data Breach Investigations Report
100%
75%
50%
25%
2006 ---------------------------- YEAR ---------------------------- 2015
%,
wh
ere
“d
ay
s o
r le
ss
”
of malware hashes are seen for
only 58 seconds or less1
5
Reduce endpoint
comprises Prevent
Threats
Protect
Data
Secure the data
itself, everywhere
Protect data on the
endpointsDetect anomalous
behavior
Control access to
online assets
Endpoint security requirements:
Recover lost data
Effective management
of endpoints
Self-healing visibility
and remediation
6
Prevent
Threats
Machine learning for effective threat prevention
Detect and respond to anomalous endpoint behavior
Address credential theft, with multi-factor authentication
Prepare for worse with continuous cloud-based backup
7
Protect
Data
Pre-execution protection
Efficiently exceed compliance with
at-rest data encryption
Simplified device management for all
your endpoints
See and secure data and services, on
and off network
Secure data everywhere, in any state
8
Advanced Threat Prevention
• Machine learning with pre-
execution prevention
• Reduced device impact
• Lower management overhead
Staying ahead of evolving threats, exceeding
compliance; simply
Endpoint Security Suite Enterprise
Device Security
• Host based firewall
• Web protection
• Content filtering (3Q)
Endpoint Encryption
• Centrally managed / flexible options
• File-encryption: more efficient |
secure
• Seamless remote media protection
• Bitlocker management
Powered by:
9
Single management console for all policies
Flexible
encryption options
ATP and client
protection
Seamless removable
encryption
External data security
10
Protect
Data
Pre-execution protection
Efficiently exceed compliance with
at-rest data encryption
Simplified device management for all
your endpoints
See and secure data and services, on
and off network
Secure data everywhere, in any state
11
Protecting data – existing approach
creates a “wall” around
the network to prevent
data from escaping the
protected company
network.
Documents shared with partners
But data WILL escape…
Documents provided to temporary employees
Employees use cloud share, moving to
personal devices, using public WiFi
Data Loss Prevention
Securing data wherever it is
The Data
Guardian
experience
You send a file to a
collaborator.
!
Protect your
data wherever it
goes.
Control who
gets access to
your data.
Monitor data
activity
and location.
With Dell Data Guardian, the focus shifts to securing the data itself. All data carries its
individual encryption and policy, making it self-protecting data.
Encrypt data at rest
and on the move.
Control collaborator’s
access and interaction
with the file.
Detailed information on file usage provides actionable insights.
The data guardian workflow— A Closer Look
Policy-Based Permission
IT defines policy for
different job-functions
with all keys centrally managed.
1 Minimal Employee Friction
Employee initiates
send to external
party – prompt to confirm
distribution within Outlook.
2
Efficient 3rd Party Access
Targeted recipient accesses
doc after simple one-time
registration with agent
download or HTML5 viewer.
3 Maintain Control
Recipient can edit and save, but policy defines rights mgmt(exp/ embargo, copy/ paste, print, send).
!
4
Monitor and
Protect
IT track and audit all
events (data can be
exported SIEM).
Revoke rights if threat
is detected.
5
15
Solutions built to address
today’s security environment
Transparent protection
of mobile, collaborative
end users
Simplified,
integrated
inter-operability,
from one partner
Why Dell data security?