Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity and cost with Dell Data Protection and Encryption, James Meakin, Product Specialist DDP, Dell
It’s getting more complex to comply with new legislation and policies around data security. Meeting the high demands of end users that want Cloud and BYOD. In this session, you’ll get to see how Dell Dataprotection Protection & Encryption solution reduce encryption/security IT administrators work load and provide a transparent experience to their end-users, whilst reducing encryption complexity and cost.
Similar to Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity and cost with Dell Data Protection and Encryption, James Meakin, Product Specialist DDP, Dell
Similar to Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity and cost with Dell Data Protection and Encryption, James Meakin, Product Specialist DDP, Dell (20)
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity and cost with Dell Data Protection and Encryption, James Meakin, Product Specialist DDP, Dell
1. Endpoint Security - How to
Balance Productivity and Security
James MEAKIN
8th September 2015
2. Why are business prioritizing data security?
07/09/20152
average amount paid
following a security breach, up
from $5.4M in 2013.3
the cost per lost or stolen
record increased over the last
year from $188 to $201.3
increase in records
compromised due to a
security breach since 2013.2
87% 29.4%
of organizations have
experienced a security breach
in the last 12 months.1
>75M
records have been
compromised this year in
approximately 568 breaches.2
of companies concerned
about lack of control and
security in the Cloud.4
73%$201 $5.9M
!
3. Market trends are increasing pressure on endpoint
security
07/09/20153
Compliance Pressures
75% of organizations lack resources to meet
compliance regulations. 73% say increasing
audit burden is their biggest challenge.3
Evolving User Behavior
200 million employees bring their own device to work.1
66% use free file-sharing platforms to share corporate data.2
Data Explosion
2.5 quintillion bytes of data created every
day, and end users are accessing it
everywhere.4
Growing Threats
In just one month, 280 million malicious programs, 134 million
Web-borne infections, and 24 million malicious URLs are detected.5
Endpoint
Security
1. Mobile Is The New Face Of Engagement, Forrester Research, February 2012
2. Workforce Mobilization: What Your I.T. Department Should Know, SkyDox, June 2012
3. 2013 State of the Endpoint, Ponemon Institute, December 2012
4. Understanding Big Data, IBM
5. Kaspersky April 2012 Threat Report
4. The IT balancing act
07/09/20154
End user
demands
Data
protection
How do you balance end user expectations to work when and where they
want, on any device with the need to protect data and meet compliance?
5. The concept of Risk
07/09/20155
The potential that a given threat will
exploit vulnerabilities and thereby cause
harm. It is measured by the probability of
occurrence and its impact.
6. Assessing Endpoint Risk
07/09/20156
Considerable
Average
Probability of
occurrence
Impact
Very Substantial Irreversible
Low
Low
High
………
Region of
acceptable risk
Region of
unacceptable risk
Principal Endpoint Threats
• PC theft
• PC lost
• Hardware failure
• Virus/Malware
• Inappropriate use
• Intrusion
• Weak passwords
• Compliance
7. What technologies help protect against these
threats?
07/09/20157
Threats Technology
Stolen or Lost PC Encryption
Hardware Failure Back-Up
Virus / APT / 0 day Anti-malware
Remote access/ Intrusion Anti malware & personal Firewall
Inappropriate use Personal Firewall & Web filters
Weak passwords Strong Authentication
Compliance Encryption
11. Dell’s most secure commercial PCs
with Dell Data Protection Portfolio of endpoint security solutions
07/09/201511
AuthenticationEncryption Threat Protection
DDP | Encryption DDP | Security Tools DDP | Protected Workspace
DDP | Endpoint Security Suite
Integrated authentication, encryption & threat protection, centrally managed via a single console
12. Dell Data Protection | Encryption
BitLocker Manager
Centrally managed via
the DDP | E console
Begin with
software
encryption
Hardware
encryption for
enhanced
performance
Personal Edition
Locally managed for
Dell & non-Dell
systems
Enterprise Edition
Centrally managed
for Dell & non-Dell
Systems
Hardware Crypto Accelerator
FIPS 140-2 Level 3 validated
Self-Encrypting Drives (SED)
Fully integrated authentication,
management & reporting
Mobile Edition
Centrally manage
Android and iOS
security
Cloud Edition
Encrypt files in
DropBox, Box & other
public cloud storage
External Media Edition
Add to BitLocker or
SED for complete
protection
And protect
data wherever
it goes
13. 07/09/201513
Dell Data
Protection |
Security
Tools
Flexible, secure
solutions to keep
unauthorized users
out of your data
and your business
Embedded in all
Latitude laptops
and Dell Precision
mobile
workstations
Hardware based multi-factory login solutions
ControlVault™
Keeps user passwords and credentials on a separately
controlled hardware chip for secure authentication
Smart Cards
Integrated Contact &
contactless
smart card reader
Fingerprint
Integrated and 3rd
party fingerprint
reader support
Pre-boot
Pre-boot
authentication with
single sign-on
Improve your login security
14. Dell Data Protection | Security Tools
Comprehensive lineup of authentication options
07/09/201514
Dell ControlVault Security Processor
• Keeps user passwords and credentials on
a separately controlled hardware chip for
secure authentication
• Isolates fingerprint processing and
storage from OS and physical hard drives
for ultimate protection against potential
compromise
• Embedded in all Latitude laptops and
Dell Precision mobile workstations
Fingerprint
Processing
Processes and stores
fingerprint credentials
on FIPS 201 compliant
memory chip
Single Sign-On
Simple, secure
access with pre-
boot/ pre-Windows
authentication all the
way through Active
Directory log on
Smartcard
Controller
Contact or contact-
less SC support, HID
iClass or FIPS 201
PIV cardsControlVault
15. Next Generation DDP | Security Tools
07/09/201515
• DDP | Security Tools pairs with the Security Tools mobile app
• End-users can reset a Windows password on their Dell PC,
eliminating a call to the service desk
• Password reset is protected with embedded hardware and
the use of one-time passwords
>30%
of IT service desk calls
are for password reset
16. Dell Data Protection | Protected Workspace
Works with traditional malware protection to better address the modern
threat landscape
07/09/201516
Segregate untrusted content
Launches the most highly targeted apps—Web browsers, PDF readers, Office apps, Zip
files and Exe files—in a contained virtual environment or “sandbox” to protect against
direct attack
Detection
Spot all forms of malware
Uses behavioral-based malware identification to detect any malicious behavior – both
known and zero-day attacks that the AV/AM software hasn’t learned of yet
Prevention
Stop malware in its tracks
Immediately stops the attack in its tracks, disposes of the tainted sandbox, and restores
the secure virtual environment
Containment
17. 07/09/201517
Dell Data
Protection |
Endpoint
Security
Suite
A single
integrated
solution that
protects your
business, data,
systems, users
and reputation
Authentication Encryption
• FIPS 201 smartcards
• Fingerprint
• Windows password
reset via
smartphone
• Multi-factor
• Encrypt local drives
& external media
• Optional hardware
encryption
• Agentless Android &
iOS security
• BitLocker & SED
support
Threat protection
• Anti-virus
• Anti-spyware
• Host firewall
• Web Content
filtering
• Server threat alerts
Simplified management
Single pane of
glass
Consolidated status and
compliance reporting
Virtual console
options
18. Only Dell offers
the complete
portfolio of
endpoint security
solutions with the
capability to
address these
challenges
Complete portfolio of encryption solutions
Protect data no matter where end users take it.
Advanced malware protection
Proactively protect users and data against daily threats that
traditional anti-virus solutions can’t block.
Advanced Authentication
The largest portfolio of integrated authentication solutions that
includes fingerprint and smart card support.
19. The high
cost of doing
nothing
Luke Shutler
Strategic Alliances Manager