ubiquitous information protection: anywhere, anytime, any device

14
Ubiquitous information protection: anywhere, any time, any device Jonathan Sander Director Product Strategy, Identity and Access Management Dell Software Group

Upload: dell-enterprise

Post on 20-Jan-2015

1.777 views

Category:

Technology


1 download

DESCRIPTION

Jonathan Sander Director Product Strategy, Identity and Access Management Dell Software Group

TRANSCRIPT

Page 1: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Ubiquitous information protection:anywhere, any time, any deviceJonathan SanderDirector Product Strategy, Identity and Access ManagementDell Software Group

Page 2: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Ubiquitous information protection:anywhere, any time, any devicePatrick SweeneyExecutive Director of Network SecurityDell Software Group

Page 3: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Security is impacting the businesswhen it should enable the business

A major pain• Security is identified in the top 3 as

the single greatest obstacle to realizing the full benefits of IT

Complex issue• Threats are everywhere and

constantly changing• Many technology options to

mitigate threats

A more effective

and efficient way to

solve your challenges starts with

an understan

ding of how Dell leverages

our collective assets.

Business needs are not

adequately

addressed by

security solutions

Barrier to realizing full IT benefits

Top 3

Page 4: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Business can’t stop to wait for security

Desire: To embrace business trends

Challenge:Security often gets in the way

How often

have you stalled a project due to

security concerns

?

But it often does, or even bypasses it

Web 2.0 Virtualization Compliance

Cloud SaaS BYODData growth

Page 5: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Today, layers and silos get the security job done but often don’t support key initiatives

Dell belief: there is a better

waySilos and layers add stress to your resources• Difficult to get to work together• Limited security resources

Individual job done well in silos• Solutions often don’t work

together• Solutions don’t work across

the business

Page 6: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Dell’s vision for tomorrow is Connected Security

Connected Security is security that…• Works collectively together; shares

and applies intelligence• Works with the business, end-to-end• Maintains flexibility and modularity

yet is expansive & cohesive – open architecture

• Enables broad contextual awareness with dynamic control

Leverages contextual awareness and shared

intelligence to deliver superior security

Security to

enable business

while also

meeting the

needs of security

Protect information everywhere

Effective

Work with the business

Efficient

Page 7: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Dell’s approach to Connected Security is a comprehensive lifecycle approach • Embed security at time of

manufacturing • Provide active information

protection from device to the cloud

• Detect threats & mitigate risks with predictive intelligence

• Respond to breaches to quarantine and remediate immediately

Embed

Protect

Respond

Detect

Page 8: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Dell Connected Security begins with a foundation of best-in-class solutions

Easy to use, easy to deploy

Actionable, context-aware intelligence

Security expertise when needed

Security ServicesManaged Security ServicesCounter Threat Unit IntelligenceSecurity Consulting & Auditing

Dell Services

Network SecurityNext-generation FirewallEmail SecuritySecure Remote Access

Dell Software Group

Information & Identity ProtectionData encryptionIdentity & Access Management

Dell Software Group

Dell End User Computing

Page 9: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Dell Connected Security works with the business, end-to-end

Dell SecureWorks + Dell SonicWALL + other security

solutions

Provides improved insight & decision making – better together

Dell SonicWALL firewalls + Dell

identity & access management

Dell Business- In-A-Box

Security ServicesManaged Security ServicesCounter Threat Unit IntelligenceSecurity Consulting & Auditing

Dell Services

Network SecurityNext-generation FirewallEmail SecuritySecure Remote Access

Dell Software Group

Information & Identity ProtectionData encryptionIdentity & Access Management

Dell Software Group

Dell End User Computing

Page 10: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Providing ubiquitous information protection while enabling the business

Collaboration between

security and the business will produce

vast improvemen

ts

Protect information everywhere

Effective

Work across the business

Efficient

Connected Security is security that…

Leverages contextual awareness & shared

intelligence to deliver superior security results while working

with the business

Page 11: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Let’s get started

Engage with experts at the Expo• And visit www.Dell.com

Envision a solution with a Security Whiteboard Session after Dell World

Gain hands on experience/demos in the Solution Center

Page 12: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Confidential

On the Dell World app

Or

Contentstyleguidelines Session Evaluation Survey

On paper• Forms in room• Turn in on the way

out

4. Select survey title

5. Simply complete the survey

3. Select Surveys

1. Select My Schedule

2. Select session to evaluate

Please help Dell meet your needsby filling out the Session Evaluation Surveys

Page 13: Ubiquitous Information Protection: Anywhere, Anytime, Any Device
Page 14: Ubiquitous Information Protection: Anywhere, Anytime, Any Device

Embed Protect

Respond Predict & Detect