Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
MT54:
Better Security
is Better Business
Tom Ricoy, Director of Marketing, Data Security Solutions, Dell
Dell - Internal Use - Confidential2 of Y
Growing impact of failure
 $445 billion global cost of
cyber crime
 $3.8M avera...
Dell - Internal Use - Confidential3 of Y
But more difficult than ever
435,000 new
malware variants
produced daily
7 millio...
Three big
challenges
Data as the new currency,
needs to be protected from
threats, both internal and
external
Trade off be...
Dell - Internal Use - Confidential5 of Y
What should you do?
Define a cyber-security plan. Ensure it is aligned with your ...
Dell - Internal Use - Confidential6 of Y
Converged data-centric security portfolio
Data Threat Identity Management
Data pr...
Best-in-class solutions…
together
Dell - Internal Use - Confidential8 of Y
Endpoint Data Security and Management
 Dell Encryption
Data Threat Identity Mana...
Dell - Internal Use - Confidential9 of Y
Endpoint Data Security and Management
 Dell Encryption
 Mozy Pro
 Mozy Enterpr...
Dell - Internal Use - Confidential10 of Y
Endpoint Data Security and Management
 Dell Encryption
 Mozy Pro
 Mozy Enterp...
Dell - Internal Use - Confidential11 of Y
X`X`
AirWatch Blue, Green, and ExpressMozyPro and MozyEnterprise
 Leader in Gar...
Dell - Internal Use - Confidential12 of Y
X`X`
RSA NetWitness EndpointRSA SecurID Access
 70-90% of malware
samples are u...
Dell - Internal Use - Confidential13 of Y
Taking steps towards a more secure tomorrow
Crawl: Joint GTM
1 2 3
• Single purc...
Dell - Internal Use - Confidential14 of Y
Better together, stronger ahead
Common UI and workflow,
single console and
conso...
Solution built
to address
today’s security
environment
Transparent
protection of mobile,
collaborative end
users
Simplifie...
Dell - Internal Use - Confidential16 of Y
Transforming security everywhere…
with our unique and unprecedented
combination ...
Visit demos at the Dell
EMC World Expo:
 Dell Endpoint Security
Suite Enterprise
 Mozy, RSA, and AirWatch
security solut...
Dell - Internal Use - Confidential18 of Y
Upcoming SlideShare
Loading in …5
×

MT54 Better security is better business

409 views

Published on

Market trends are favorable to continue consolidation in the endpoint security and management space. In this session, learn how Dell's security and management portfolios will help you address critical vulnerabilities, and simplify management and deployment of the most secure endpoints for your business.

  • Be the first to comment

  • Be the first to like this

MT54 Better security is better business

  1. 1. MT54: Better Security is Better Business Tom Ricoy, Director of Marketing, Data Security Solutions, Dell
  2. 2. Dell - Internal Use - Confidential2 of Y Growing impact of failure  $445 billion global cost of cyber crime  $3.8M average data breach cost up 38%  $254M 1H16 US ransomware payments Meeting worker expectations  65% of employees sometimes work at home  78% employees in highly regulated industries use free cloud services Better security is better business
  3. 3. Dell - Internal Use - Confidential3 of Y But more difficult than ever 435,000 new malware variants produced daily 7 million phishing campaigns monthly Every 53 seconds a laptop is lost or stolen 1:22 average time before compromise for phishing campaign 205 days elapsed time between compromise and detection 95% of all data breaches originate at endpoint 77% of organizations say they experienced a compromise in last 12 months
  4. 4. Three big challenges Data as the new currency, needs to be protected from threats, both internal and external Trade off between workforce innovation and security Too many vendors, consoles agents; not efficient, not secure
  5. 5. Dell - Internal Use - Confidential5 of Y What should you do? Define a cyber-security plan. Ensure it is aligned with your business strategy and imperatives Secure your endpoints. Conduct end user education. Embrace modern techniques for end point security Defense in depth. No silver bullet. Protect yourself with complement, layered security. Choose a strategic partner. Simplify and improve security through integrated portfolio.
  6. 6. Dell - Internal Use - Confidential6 of Y Converged data-centric security portfolio Data Threat Identity Management Data protected at rest, in motion and in use, backed-up to avoid data loss Prevention, detection and remediation for endpoints Access to the right person for the right data at the right time Modern management for endpoints and devices
  7. 7. Best-in-class solutions… together
  8. 8. Dell - Internal Use - Confidential8 of Y Endpoint Data Security and Management  Dell Encryption Data Threat Identity Management  Dell Threat Defense (SB)  Dell Security Tools  Dell Command Dell Endpoint Security Suite Enterprise
  9. 9. Dell - Internal Use - Confidential9 of Y Endpoint Data Security and Management  Dell Encryption  Mozy Pro  Mozy Enterprise Data Threat Identity Management  Dell Threat Defense (SB)  RSA NetWitness Endpoint  Dell Security Tools  RSA SecurID Access  Dell Command  AirWatch Green  AirWatch Blue  AirWatch ExpressDell Endpoint Security Suite Enterprise
  10. 10. Dell - Internal Use - Confidential10 of Y Endpoint Data Security and Management  Dell Encryption  Mozy Pro  Mozy Enterprise Data Threat Identity Management  Dell Threat Defense (SB)  RSA NetWitness Endpoint  Dell Security Tools  RSA SecurID Access  Dell Command  AirWatch Green  AirWatch Blue  AirWatch ExpressDell Endpoint Security Suite Enterprise
  11. 11. Dell - Internal Use - Confidential11 of Y X`X` AirWatch Blue, Green, and ExpressMozyPro and MozyEnterprise  Leader in Gartner MQ for EMM Suites for 6th consecutive year  Largest EMM vendor in IDC Worldwide EMM software market  Leader in Forrester Wave EMM Report  “Top Player” in Radicati EMM Market Quadrant • Any device + any use case + unified management • Modern management framework • Low TCO, simpler, flexible  75% of businesses are not confident in their ability to restore data  $1,325 is the average cost of a recovering data on a hard drive  $1,500 is the average productivity loss of estimate • Cloud based sync, backup and restore • Continuous backup • 90 days of version protection • Protect against data vulnerabilities due to user error, hardware failure, malware attack and natural disaster Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
  12. 12. Dell - Internal Use - Confidential12 of Y X`X` RSA NetWitness EndpointRSA SecurID Access  70-90% of malware samples are unique to an organization  390k new malware per day  Serving 200+ of the Fortune 500 • Behavioral-based detection of unique, targeted and unknown threats • Respond in minutes, not months • Lightweight kernel- level agent for continuous endpoint monitoring  More than 25 years in the market  Gartner leader’s quadrant  55 million+ tokens shipped  Only 20% of a user population use multi- factor authentication • Multi-factor authentication • Combining something you know + something you have • Time based authentication so continuous Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
  13. 13. Dell - Internal Use - Confidential13 of Y Taking steps towards a more secure tomorrow Crawl: Joint GTM 1 2 3 • Single purchase path • Solution interoperability and validation testing • Solution bundles targeting key customer needs • Dell ProSupport for integrated technical support • Endpoint agents and management console integration • Shared threat information • Lifecycle endpoint recovery Timing: 1H17 Timing: 2H17Timing: 2H16
  14. 14. Dell - Internal Use - Confidential14 of Y Better together, stronger ahead Common UI and workflow, single console and consolidated agent Simplified management. Superior security Integrated Security Provide insights for data, security and user behavior Better forensics and improved security defenses and user tools Security Analytics Efficient device management and seamless restoration Improved user uptime and cost savings Endpoint Management & Resiliency Strategic Focus Areas for Cross-Product Development
  15. 15. Solution built to address today’s security environment Transparent protection of mobile, collaborative end users Simplified, integrated inter-operability, from one partner Why Dell and why now?
  16. 16. Dell - Internal Use - Confidential16 of Y Transforming security everywhere… with our unique and unprecedented combination of security and management capabilities… simplified and converged
  17. 17. Visit demos at the Dell EMC World Expo:  Dell Endpoint Security Suite Enterprise  Mozy, RSA, and AirWatch security solutions Learn more at DellSecurity.dell.com Let’s talk
  18. 18. Dell - Internal Use - Confidential18 of Y

×