stopping threats in real time with dell data security ...€¦ · protecting data from external and...
TRANSCRIPT
![Page 1: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/1.jpg)
Stopping Threats in
Real Time with
Dell Data Security
Solutions
![Page 2: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/2.jpg)
2
As mobility, productivity and flexibility increase in the workplace, so do security challenges.
Protecting data from external and internal threats
Trade off between workforce innovation and security
Too many vendors, consoles agents; not efficient, not secure
![Page 3: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/3.jpg)
End users are the greatest security challenge
3
Employees willing to
share confidential data
externally.
Employees frequently
open emails from
unknown senders.
Employees use
corporate-issued devices
to access personal social
media accounts.
1 in 3
72%
49%Employees report using
public cloud sharing
services.
56%
Data breaches
originate with
endpoints.
95%
![Page 4: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/4.jpg)
Attackers are winning on the endpoint
99%
of malware samples are unique
to an organization290%
of cases took just minutes to
compromise an endpoint193%
of end-users in incidents
opened phishing emails130%
TIME TO DISCOVERY
TIME TO COMPROMISE
Source: Verizon 2016 Data Breach Investigations Report
100%
75%
50%
25%
2006 ---------------------------- YEAR ---------------------------- 2015
%,
wh
ere
“d
ay
s o
r le
ss
”
of malware hashes are seen for
only 58 seconds or less1
![Page 5: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/5.jpg)
Reduce endpoint
comprises Prevent
Threats
Protect
Data
Secure the data
itself, everywhere
Protect data on the
endpointsDetect anomalous
behavior
Control access to
online assets
Endpoint security requires:
Recover lost data
Effective management
of endpoints
Self-healing visibility
and remediation
![Page 6: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/6.jpg)
Prevent
Threats
Machine learning for effective threat prevention
Detect and respond to anomalous endpoint behavior
Address credential theft, with multi-factor authentication
Prepare for worse with continuous cloud-based backup
![Page 7: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/7.jpg)
Advanced Threat Prevention
• Machine learning with pre-
execution prevention
• Reduced device impact
• Lower management overhead
Staying ahead of evolving threats, exceeding
compliance; simply
Endpoint Security Suite Enterprise
Device Security
• Host based firewall
• Web protection
• Content filtering (3Q)
Endpoint Encryption
• Centrally managed / flexible options
• File-encryption: more efficient |
secure
• Seamless remote media protection
• Bitlocker management
Powered by:
![Page 8: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/8.jpg)
Single management console for all policies
Flexible
encryption options
ATP and client
protection
Seamless removable
encryption
External data security
![Page 9: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/9.jpg)
Protect
Data
Pre-execution protection
Efficiently exceed compliance with
at-rest data encryption
Simplified device management for all
your endpoints
See and secure data and services, on
and off network
Secure data everywhere, in any state
![Page 10: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/10.jpg)
Protecting data – existing approach
creates a “wall” around
the network to prevent
data from escaping the
protected company
network.
Documents shared with partners
But data WILL escape…
Documents provided to temporary employees
Employees use cloud share, moving to
personal devices, using public WiFi
Data Loss Prevention
![Page 11: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/11.jpg)
Protecting data — the future
With Dell Data Guardian, the focus shifts to securing the data itself.
All data carries its individual encryption and policy,
making it self-protecting data.
Protect data,
wherever it goes
Control who gets
access to data
Monitor data activity
and location
![Page 12: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/12.jpg)
Securing data wherever it is
The data
guardian
experience
You send a
file to a
collaborator.
!
Protect your data
wherever it goes.
Control who gets
access to your data.
Monitor data activity
and location.
Encrypt data at rest
and on the move.
Control collaborator’s
access and
interaction with the
file.
Detailed information on file usage provides actionable insights.
![Page 13: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/13.jpg)
The data guardian workflow— A Closer Look
Policy-Based Permission
IT defines policy for
different job-functions
with all keys centrally managed.
1 Minimal Employee Friction
Employee initiates
send to external
party – prompt to confirm
distribution within Outlook.
2
Efficient 3rd Party Access
Targeted recipient accesses
doc after simple one-time
registration with agent
download or HTML5 viewer.
3 Maintain Control
Recipient can edit and save, but policy defines rights mgmt(exp/ embargo, copy/ paste, print, send).
!
4
Monitor and
Protect
IT track and audit all
events (data can be
exported SIEM).
Revoke rights if threat
is detected.
5
![Page 14: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/14.jpg)
Endpoint Security
Suite Enterprise Prevent
Threats
Protect
Data
Data Guardian
EncryptionThreat Defense
NetWitness
Endpoint & SecurID
Dell offers best-in-class endpoint data security and management
Intel® Authenticate
![Page 15: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/15.jpg)
Leading endpoint security partner
Integrating portfolio with:
• Single purchase path
• Integrated support
• Threat information sharing
• Simplified management
Intel® Authenticate
![Page 16: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/16.jpg)
Solutions built to address
today’s security environment
Transparent protection
of mobile, collaborative
end users
Simplified,
integrated
inter-operability,
from one partner
Why Dell data security?
![Page 17: Stopping Threats in Real Time with Dell Data Security ...€¦ · Protecting data from external and internal threats ... Employees frequently open emails from unknown senders. Employees](https://reader034.vdocument.in/reader034/viewer/2022052004/60173bff59ecb2781c60a7a7/html5/thumbnails/17.jpg)