Dell Client Solutions Security Portfolio 2014
 

Like this? Share it with your network

Share

Dell Client Solutions Security Portfolio 2014

on

  • 732 views

Dell offers proactive security solutions designed to provide organizations of all sizes with protection for their valuable data in the face of new and increasingly sophisticated end user security ...

Dell offers proactive security solutions designed to provide organizations of all sizes with protection for their valuable data in the face of new and increasingly sophisticated end user security threats, while continuing to meet employees’ expectations for anytime, anywhere productivity and data access. Find out more: http://del.ly/DellSecuritySolutions

Statistics

Views

Total Views
732
Views on SlideShare
369
Embed Views
363

Actions

Likes
0
Downloads
7
Comments
0

7 Embeds 363

http://en.community.dell.com 352
https://twitter.com 4
https://m.facebook.com 2
http://plus.url.google.com 2
http://news.google.com 1
http://analyst.ciradar.com 1
https://www.linkedin.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • And how do you do it without adding IT complexity?
  • Dell Rugged devices are the world’s most secure with Dell Data Protection solutions that provide comprehensive encryption, advanced authentication and leading-edge malware prevention. <br /> <br /> Dell Data Protection | Encryption is the most comprehensive solution suite for protecting end user data on any device, external media and in the cloud. <br /> <br /> Dell Data Protection | Security Tools enables advanced authentication, such as Dell’s fully-integrated smart card/contactless smart card and fingerprint readers. Dell Rugged devices offer the industry’s only FIPS-compliant TPM. <br /> <br /> Dell Data Protection | Protected Workspace provides leading-edge malware protection that stops the most advanced attacks, even zero-day threats, in their tracks.   <br />

Dell Client Solutions Security Portfolio 2014 Presentation Transcript

  • 1. 1 Dell Client Solutions Security Portfolio August 2014
  • 2. Client Solutions Security Market trends are increasing pressure on endpoint security Compliance Pressures 75% of organizations lack resources to meet compliance regulations. 73% say increasing audit burden is their biggest challenge.3 Evolving User Behavior 200 million employees bring their own device to work.1 66% use free file-sharing platforms to share corporate data.2 Data Explosion 2.5 quintillion bytes of data created every day, and end users are accessing it everywhere.4 Growing Threats In just one month, 280 million malicious programs, 134 million Web-borne infections, and 24 million malicious URLs are detected.5 Endpoint Security 1. Mobile Is The New Face Of Engagement, Forrester Research, February 2012 2. Workforce Mobilization: What Your I.T. Department Should Know, SkyDox, June 2012 3. 2013 State of the Endpoint, Ponemon Institute, December 2012 4. Understanding Big Data, IBM 5. Kaspersky April 2012 Threat Report
  • 3. Client Solutions Security3 The IT balancing act End user demands Data protection How do you balance end user expectations to work when and where they want, on any device with the need to protect data and meet compliance?
  • 4. Client Solutions Security Organizations are looking for ways to: 8/19/20144 as it moves with end users without adding IT burden of the entire endpoint security strategy without disruption or risk Protect data Meet compliance Simplify management Enable productivity
  • 5. Client Solutions Security5 At Dell, we believe endpoint security and compliance don’t have to be difficult or disruptive. Dell endpoint security solutions protect data wherever it goes without sacrificing IT or end user productivity. Our endpoint security point of view
  • 6. Client Solutions Security6 Dell recommends: Every endpoint security strategy should include four key components Encryption Malware PreventionAuthentication Centralized, remote management Ensure only authorized users have access to your data Proactively protect users and data against daily threats Protect data no matter where end users take it
  • 7. Client Solutions Security7 Encryption Malware PreventionAuthentication Centralized, remote management Ensure only authorized users have access to your data Proactively protect users and data against daily threats Protect data no matter where end users take it Dell Data Protection portfolio Only Dell offers a complete portfolio of endpoint security solutions Dell Data Protection | Security Tools Comprehensive line-up of authentication solutions Dell Data Protection | Encryption A simple, comprehensive, flexible way to protect data from device to the cloud Dell Data Protection | Protected Workspace A proactive approach to defeating malware and advanced persistent threats in real-time
  • 8. Client Solutions Security8 File level encryption that protects data no-matter where is goes… …and IT maintains encryption keys and control Dell Data Protection | Encryption Virtually transparent to end-users Provides end-user data protection across end-points Single management console Available on both Dell and non-Dell systems. Corporate issue PC Personal tablet BYOD Smartphone USB Remote media Public Cloud Company data File level encryption
  • 9. Client Solutions Security Broadest range of fully-integrated advanced authentication options, including fingerprint, smart card and contactless smart card readers and hardware credential processing. FIPS 140-2 compliant TPM, hardware password manager for more secure credential protection and FIPS 201 compliant fingerprint reader Consolidated management of access control and encryption policies from one console and easy deployment and integration with single sign-on for Windows Active Directory. Advanced authentication credentials enable employees to log in once without having to memorize multiple passwords – or worse – write them down! 9 Dell authentication solutions Flexible, secure solutions to keep unauthorized users out of your data and your business Comprehensive protection Easier compliance Simplified management End user productivity
  • 10. Client Solutions Security10 Dell Data Protection | Protected Workspace A proactive approach to defeating malware and advanced persistent threats in real-time Comprehensive protection Automatically detects and blocks all malicious behavior – even zero- day attacks that traditional AV/AM software hasn’t learned of yet. End user productivity End users securely work as they always have using the tools they need, without interruption. Easy activation Ships pre-installed on Dell commercial PCs and saves IT countless hours of remediation work.
  • 11. Client Solutions Security11 Simplified central management without disruption Save time with a single remote management console, easy deployment and seamless integration into your IT environment Centralized, remote management Reduce deployment time with auto provisioning feature available when purchased on a Dell commercial device Deploy 5X faster than traditional encryption solutions, saving >3 hours per PC Single source for solutions and support Remotely manage all endpoint security needs from a single console: encryption and authentication, port control, compliance, and cloud and mobile security Data-centric encryption won’t interfere with existing IT maintenance tools, such as patch management
  • 12. 12 Questions? Contact a DDP | E Specialist directly at: datasecurity@dell.com Visit www.dell.com/dataprotection