This document discusses strategies for protecting endpoints from targeted attacks. It begins with an overview of the increasing threats facing organizations from malware and cyber attacks. It then outlines five principles for an effective endpoint security strategy: 1) get organizational endpoints in order through vulnerability management and application control, 2) focus on protecting data rather than infrastructure on unmanaged devices, 3) utilize thin clients and cloud-based solutions, 4) implement a zero-trust approach to authentication, and 5) maintain visibility into endpoint activity. The document recommends implementing application control, patching vulnerabilities, deploying recommended security practices, improving authentication, and integrating network and endpoint security controls. It emphasizes continuing to shift focus to securing unmanaged devices by decoupling protection from infrastructure.
2. ®
Every company is becoming an IT company
they’re just focused on different verticals.”
John Chambers, Cisco
= Huge attack surface
3. Today’s Session
Security, user experience & visibility
State of threats and security and
the need to “think different”
Two domains: Managed endpoints
and unmanaged endpoints
5 design principles for an effective
endpoint security strategy
How VDI plays a big role in
security and security plays a
big role in VDI
Thin clients’ natural malware
resistance
31. Cloud client-computing
• Dell - Internal Use - Confidential
Deliver nearly any desktop app to any user on any device
Move your desktops to the cloud and:
Empower the workforce
Enable BYOD, deliver securely to any device, enhance user collaboration
Optimize IT resources
Reduce IT resources, scale and speed deployment
Improve security
Control data, recover from disasters, apply policies, comply with regulations,
and monitor risk
Manage costs
Monitor and optimize total cost of ownership, achieve greater utilization from
infrastructure assets, reduce energy use
32. Cloud client-computing
• Dell - Internal Use - Confidential
Highly-regulated industries were first to embrace this model
to increase security and reduce costs
33. Cloud client-computing
• Dell - Internal Use - Confidential
Solutions that scale with your needs
Specialized
appliances
Reduced TCORapid deploymentEasy installation
Your choice of datacenter hardware with… …your choice of pre-tested software options
Wyse Datacenter
Towers with local
storage
VRTX (new form
factors)
Full racks with
modular options
34. Cloud client-computing
• Dell - Internal Use - Confidential
Wyse Clients
Industry-leading thin clients
Secure
the most secure thin clients on
the planet
Versatile
tailored clients for Citrix,
VMware, and Microsoft
Powerful
handle demanding tasks from
video editing to 3D modeling
Connected
support a broad range of
peripherals
Desktop All-in-one Mobile Ultra mobile
Dell offers the most extensive selection of secure, easy-to-manage thin
and zero clients to suit your budget, application, and performance needs.
35. Cloud client-computing
• Dell - Internal Use - Confidential
See for yourself - next steps
More information On the web: Dell.com/wyse
Schedule a demo
Work with your sales representative to schedule a demo.
Access a range of demos, including Dell Enterprise Solutions, Dell DaaS, Dell DVS Simplified Appliance and others. Learn More
Engage the experts
Engage with your cloud client-computing sales specialist early in the pursuit.
Leverage the knowledge of Dell's desktop virtualization experts.
a demo at
a Dell Solution Center
View
Dell IT Consulting to
assess your needs
Engage
an Executive Briefing on cloud
client-computing strategy
Schedule
37. ®
We believe you can
manage and secure
while providing a
great user experience
38. It’s Not Only About Security Needs
Endpoint manageability
License control
Profile management
Simple Desktop IT Administration
Ransomware, phishing,
social engineering
Unnecessary privileges
Audit & Compliance
Effective Endpoint Security
Performance
Flexibility & control
Consistency
Excellent User Experience
39. The most comprehensive
UEM platform.
Personalization
Environment Manager™
Security
Application Manager™
Managed data
DataNow™
AppSense management
Management Center™
Endpoint analytics
Insight™
Optimal capacity & responsiveness
Performance Manager™
AppSense
AppSense
AppSense AppSense
AppSense
AppSense
®
Personalization
Policy
Privileges
Performance
Data
Analytics
Personalization
Policy
Privileges
Performance
Data Access
Analytics
®
41. ®®
AppSense User-First Security
Secure, manageable, great user experience
Privilege Management
Least privileges
with just in time
self-elevation
Application Control
Manageability &
security through
Trusted
Ownership™
Analytics
Visibility into what’s
really going on
®
42. Global
UEM Leader
Founded in 1999 to help customers
deliver a great user experience.
• 3400+ customers
• 7.5M+ endpoints
• 400+ employees
AppSense Global HQ in Sunnyvale, California
Manchester | Reading | Munich
Amsterdam | Paris | Melbourne
Sydney | NYC | Sunnyvale | Raleigh
10 GLOBAL LOCATIONS
44. ®
Thank you!
For more information,
visit www.appsense.com or email
iwanttoknowmore@appsense.com
Editor's Notes
The pain of the Windows XP to Windows 7 migration is still fresh in many IT leaders’ minds.
AppSense eliminates the need for complex migration projects by allow the full user persona, including user files, to follow users automatically between multiple operating systems.
Desktop virtualization helps improve service delivery and competitiveness by simplifying how IT works on systems, dramatically reducing the complexity of the system and making it much more flexible. The IT group can then move from a largely reactive, technical group to a proactive strategic organization.
Empowering the workforce – makes it possible for user to bring in an iPad, windows tablet, a Dell PC. Regardless of device your user is going to get the same look at the application, they are all going to have the same level of security. Nothing can be stored on a USB key nothing can be stored on a hard disk. It is secure as you need it to be.
Optimize IT resources – managing a fleet of traditional PC is becoming increasing complex. With desktop virtualization, you are moving applications, data, and OS (the desktop) to the data center. There are certain advantages by doing this. IT is able to centrally manage “the virtual desktop” from the data center. Things like adds, moves, changes, back-ups and virus/malware protection. Virtual desktops in the data center also saves IT time and money from remotely troubleshooting PCs vs. physically visiting each PC.
Improve security - Is by the design of the architecture. The virtual desktop is secure in the data center and is delivered over a video like protocol. Every end point is like a TV set. Desktop or applications are streaming down to the device, but once the device is turned off nothing resides on the device. One of Dell’s customers, a VA hospital, had a terrible situation where they move to a new ERM system. Someone stole a laptop in the AIDS ward. Normally the notebook hard drive is wiped and then goes up on eBay. The thief in this case knew what they had and the published all of the records on the internet. The hospital was embarrassed, the families were embarrassed. With cloud client-computing that cannot happen, because that data never lands on that laptop. Whenever a device connected to desktop virtualization goes out of its network, usually Wi-Fi, the user can get back to the server. There is no local storage so we can enforce security in a way that meaningful.
Managing costs – the cost to deploy applications, the cost to deploy desktops is dramatically simpler when deploying from a data center. Add a user is nothing more that add a thin client on their desk, turning on the instance on the server, and you’re done. There are no installation of applications once its been done.
70% of our business is in 5 segments: Healthcare, Government, Education, finance, and retail. These are the highly regulated industries. These are the ones that if a mistake is made in security there can be a target loss of 10% of their business. This is where we focus and desktop virtualization shines.
Your choice of datacenter hardware with…
We have a complete selection of virtual datacenter infrastructure to meet the needs of our customers.
Our Dell DVS brand infrastructure solutions is comprised by a series of offers designed to align with the unique needs of your customers.
From on premises solutions from small to large installations, we have it all.
And, for customers who would like to easily and quickly pilot or POC desktop virtualization, or deploy a full desktop virtualization solution without buying the infrastructure, Dell offers desktop as a service, running from our own datacenters around the world. Just plug a thin client into the network, and start working.
We have virtual environment from virtual workstations which is new. We worked with AMD and NVIDA to develop. So if you have virtual workload that traditional could only have been preformed on Dell Precision workstation (i.e. Finance, CAD / CAM, tank simulations) we can now virtualize that workload.
Then starting from a small deployment with 10 seat or a pilot, through mid size with our VRTX technology, up to 50,000 seats. Or largest customer has over 150,000 simultaneously connected thin clients worldwide.
Comes down to better scalability due to better density. In January of this year (2014) The average cost to deliver a seat of VDI was $400. A lot of that cost was the SAN. We created a new desktop virtualization environment where we integrated the storage in with the server. We were able to take the cost from $400 a seat down to $190 a seat. More that 50% reduction of cost.
Dell has a wide range of data center offerings, better energy utilization, a lot less tools needed. We can spin up an entire environment with the single console.
…your choice of pre-tested software options
Dell Wyse software, cloud clients, and services provide the ultimate desktop virtualization endpoint solution when it comes to security, ease of use, and ease of management. For organizations looking to invoke a BYOD program and the Dell Wyse Cloud Client Manager cloud-based fixed and mobile device management console allows this ubiquitous user access to be “locked down” safe for both the organization and the user.
Dell Wyse cloud clients and software help companies increase security, make their IT teams much more efficient and proactive, and sharply reduce ongoing management, maintenance and energy costs.
Dell Wyse thin clients have zero disk and no moving parts, and those based on Dell Wyse ThinOS are the only virus-immune thin client operating system on the planet. Built on a firmware base that has no APIs, addressable ports or any other network-accessible vulnerabilities, ThinOS-based thin clients completely erase the threat of endpoint viruses and malware from any organization’s security equation.
Dell Wyse zero clients are designed and purpose-built to complement Citrix, Microsoft, and VMware virtual desktop environments with strong security, outstanding performance, and easy, hands-off device management.
Dell Wyse Cloud Connect (ultra mobile) Is a portable enterprise IT-controlled HDMI/MHL cloud device that allows people to convert a capable screen (TV or monitor) into a functioning interactive display controlled through Bluetooth peripherals, touch Interface or remote control on monitor/TV or companion application for smartphones and tablets. “Secure productivity from work, home, and on the go” IT managed enterprise client with outstanding portability, security, and rich user experience accessing broad applications and content in the cloud.
You probably have customers now who could benefit from Dell Cloud Client Computing. This presentation was meant as a starting point for the sales journey you’ll make with your customer. Use the links provided to understand more about the offer and what’s possible for your customer. Contact your sales solution representative and engage with them and your customer via demos and interaction.