SlideShare a Scribd company logo
1 of 25
Download to read offline
Endpoint Security - How to
Balance Productivity and Security
James MEAKIN
8th September 2015
Why are business prioritizing data security?
07/09/20152
average amount paid
following a security breach, up
from $5.4M in 2013.3
the cost per lost or stolen
record increased over the last
year from $188 to $201.3
increase in records
compromised due to a
security breach since 2013.2
87% 29.4%
of organizations have
experienced a security breach
in the last 12 months.1
>75M
records have been
compromised this year in
approximately 568 breaches.2
of companies concerned
about lack of control and
security in the Cloud.4
73%$201 $5.9M
!
Market trends are increasing pressure on endpoint
security
07/09/20153
Compliance Pressures
75% of organizations lack resources to meet
compliance regulations. 73% say increasing
audit burden is their biggest challenge.3
Evolving User Behavior
200 million employees bring their own device to work.1
66% use free file-sharing platforms to share corporate data.2
Data Explosion
2.5 quintillion bytes of data created every
day, and end users are accessing it
everywhere.4
Growing Threats
In just one month, 280 million malicious programs, 134 million
Web-borne infections, and 24 million malicious URLs are detected.5
Endpoint
Security
1. Mobile Is The New Face Of Engagement, Forrester Research, February 2012
2. Workforce Mobilization: What Your I.T. Department Should Know, SkyDox, June 2012
3. 2013 State of the Endpoint, Ponemon Institute, December 2012
4. Understanding Big Data, IBM
5. Kaspersky April 2012 Threat Report
The IT balancing act
07/09/20154
End user
demands
Data
protection
How do you balance end user expectations to work when and where they
want, on any device with the need to protect data and meet compliance?
The concept of Risk
07/09/20155
The potential that a given threat will
exploit vulnerabilities and thereby cause
harm. It is measured by the probability of
occurrence and its impact.
Assessing Endpoint Risk
07/09/20156
Considerable
Average
Probability of
occurrence
Impact
Very Substantial Irreversible
Low
Low
High
………
Region of
acceptable risk
Region of
unacceptable risk
Principal Endpoint Threats
• PC theft
• PC lost
• Hardware failure
• Virus/Malware
• Inappropriate use
• Intrusion
• Weak passwords
• Compliance
What technologies help protect against these
threats?
07/09/20157
Threats Technology
Stolen or Lost PC Encryption
Hardware Failure Back-Up
Virus / APT / 0 day Anti-malware
Remote access/ Intrusion Anti malware & personal Firewall
Inappropriate use Personal Firewall & Web filters
Weak passwords Strong Authentication
Compliance Encryption
07/09/20158
Guess What ?
07/09/20159
Dell Data Security
Solutions responds to
all these challenges.
10
Dell Connected Security portfolio
Identity & Access Mgmt
Identity Governance
Privileged Mgmt
Access Mgmt
Compliance & IT Gov
Security Services
Incident Response
Managed Security Svcs
Security & Risk Consult
Threat Intelligence
Endpoint
DDP | Encryption
DDP | Protected Workspace
DDP | Security Tools
Configuration & Patch Management
Mobile Management & Workspace
Network
Next Gen Firewall
Secure Mobile Access
Email Security
Dell’s most secure commercial PCs
with Dell Data Protection Portfolio of endpoint security solutions
07/09/201511
AuthenticationEncryption Threat Protection
DDP | Encryption DDP | Security Tools DDP | Protected Workspace
DDP | Endpoint Security Suite
Integrated authentication, encryption & threat protection, centrally managed via a single console
Dell Data Protection | Encryption
BitLocker Manager
Centrally managed via
the DDP | E console
Begin with
software
encryption
Hardware
encryption for
enhanced
performance
Personal Edition
Locally managed for
Dell & non-Dell
systems
Enterprise Edition
Centrally managed
for Dell & non-Dell
Systems
Hardware Crypto Accelerator
FIPS 140-2 Level 3 validated
Self-Encrypting Drives (SED)
Fully integrated authentication,
management & reporting
Mobile Edition
Centrally manage
Android and iOS
security
Cloud Edition
Encrypt files in
DropBox, Box & other
public cloud storage
External Media Edition
Add to BitLocker or
SED for complete
protection
And protect
data wherever
it goes
07/09/201513
Dell Data
Protection |
Security
Tools
Flexible, secure
solutions to keep
unauthorized users
out of your data
and your business
Embedded in all
Latitude laptops
and Dell Precision
mobile
workstations
Hardware based multi-factory login solutions
ControlVault™
Keeps user passwords and credentials on a separately
controlled hardware chip for secure authentication
Smart Cards
Integrated Contact &
contactless
smart card reader
Fingerprint
Integrated and 3rd
party fingerprint
reader support
Pre-boot
Pre-boot
authentication with
single sign-on
Improve your login security
Dell Data Protection | Security Tools
Comprehensive lineup of authentication options
07/09/201514
Dell ControlVault Security Processor
• Keeps user passwords and credentials on
a separately controlled hardware chip for
secure authentication
• Isolates fingerprint processing and
storage from OS and physical hard drives
for ultimate protection against potential
compromise
• Embedded in all Latitude laptops and
Dell Precision mobile workstations
Fingerprint
Processing
Processes and stores
fingerprint credentials
on FIPS 201 compliant
memory chip
Single Sign-On
Simple, secure
access with pre-
boot/ pre-Windows
authentication all the
way through Active
Directory log on
Smartcard
Controller
Contact or contact-
less SC support, HID
iClass or FIPS 201
PIV cardsControlVault
Next Generation DDP | Security Tools
07/09/201515
• DDP | Security Tools pairs with the Security Tools mobile app
• End-users can reset a Windows password on their Dell PC,
eliminating a call to the service desk
• Password reset is protected with embedded hardware and
the use of one-time passwords
>30%
of IT service desk calls
are for password reset
Dell Data Protection | Protected Workspace
Works with traditional malware protection to better address the modern
threat landscape
07/09/201516
Segregate untrusted content
Launches the most highly targeted apps—Web browsers, PDF readers, Office apps, Zip
files and Exe files—in a contained virtual environment or “sandbox” to protect against
direct attack
Detection
Spot all forms of malware
Uses behavioral-based malware identification to detect any malicious behavior – both
known and zero-day attacks that the AV/AM software hasn’t learned of yet
Prevention
Stop malware in its tracks
Immediately stops the attack in its tracks, disposes of the tainted sandbox, and restores
the secure virtual environment
Containment
07/09/201517
Dell Data
Protection |
Endpoint
Security
Suite
A single
integrated
solution that
protects your
business, data,
systems, users
and reputation
Authentication Encryption
• FIPS 201 smartcards
• Fingerprint
• Windows password
reset via
smartphone
• Multi-factor
• Encrypt local drives
& external media
• Optional hardware
encryption
• Agentless Android &
iOS security
• BitLocker & SED
support
Threat protection
• Anti-virus
• Anti-spyware
• Host firewall
• Web Content
filtering
• Server threat alerts
Simplified management
Single pane of
glass
Consolidated status and
compliance reporting
Virtual console
options
Only Dell offers
the complete
portfolio of
endpoint security
solutions with the
capability to
address these
challenges
Complete portfolio of encryption solutions
Protect data no matter where end users take it.
Advanced malware protection
Proactively protect users and data against daily threats that
traditional anti-virus solutions can’t block.
Advanced Authentication
The largest portfolio of integrated authentication solutions that
includes fingerprint and smart card support.
The high
cost of doing
nothing
Luke Shutler
Strategic Alliances Manager
© 2015 Absolute Software Corporation.All rights
reserved.
20
© 2015 Absolute Software Corporation.All rights
reserved.
21
1. The regulation will apply across Europe
2. Companies are liable to fines of up to 5 percent of their corporation’s annual global turnover
3. Companies will have to notify those whose data has been breached
4. Organisations must notify the authorities about data breaches as soon as possible
5. Companies with 250 or more employees have to employ a corporate data protection officer
5 Things to consider
Changes in EUGDPR Legislation 2017
© 2015 Absolute Software Corporation.All rights
reserved.
22
HOW WE
DO IT
WHAT
WE DO
Our Persistence® technology is embedded into the core of most Dell
devices at the factory. Once activated, it provides you with
comprehensive visibility into all of your devices allowing you to
confidently manage mobility, investigate potential threats, and take
action if a security incident occurs. Most importantly, you can apply
remote security measures to protect each device and the data it
contains.
No other technology can do this.
Absolute® provides persistent endpoint security and data risk
management solutions for computers, tablets, and smartphones.
Our customers depend on us to provide them with a unique and trusted
layer of security so they can manage mobility while remaining firmly in
control. By providing them with a reliable two-way connection with all of
their devices, our customers can secure endpoints, assess risk, and
respond appropriately to security incidents.
© 2015 Absolute Software Corporation.All rights
reserved.
23
Persistence® technology from Absolute provides you with visibility and control over all of your
devices, regardless of user or location.
1. Dell embed Persistence technology
into the firmware of devices at the
factory
2. Once the Absolute software agent is
installed, Persistence is activated
3. An automatic reinstallation is triggered
if an Absolute software client is
removed from a device
4. The reinstallation will occur even if the
firmware is flashed, the device is
reimaged, the hard drive is replaced,
or if a tablet or smartphone is wiped
clean to factory settings
HOW IT WORKS:
Persistence Technology
© 2015 Absolute Software Corporation.All rights
reserved.
24
REPORTING & ANALYTICS
GEOTECHNOLOGY
RISK ASSESSMENT
RISK RESPONSE
ENDPOINT INVESTIGATIONS
Feature Categories
=
25© 2015 Absolute Software Corporation.All rights
reserved.

More Related Content

What's hot

Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceIvanti
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceIvanti
 
Building Your Business Continuity Plan
Building Your Business Continuity PlanBuilding Your Business Continuity Plan
Building Your Business Continuity PlanIvanti
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...DevOps Indonesia
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsIvanti
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...Ivanti
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security TrendsTerra Verde
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010Joseph Mark Heinzen
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Ahmed Al Enizi
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security failEnclaveSecurity
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesIvanti
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security OfficerDirk Cipido
 

What's hot (20)

Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learnIvanti neurons - lunch and learn
Ivanti neurons - lunch and learn
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Webinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch IntelligenceWebinar Ivanti Neurons For Patch Intelligence
Webinar Ivanti Neurons For Patch Intelligence
 
Building Your Business Continuity Plan
Building Your Business Continuity PlanBuilding Your Business Continuity Plan
Building Your Business Continuity Plan
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
 
ESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to EnterprisesESET: Delivering Benefits to Enterprises
ESET: Delivering Benefits to Enterprises
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
ESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business ProductsESET: #DoMore With Our Comprehensive Range of Business Products
ESET: #DoMore With Our Comprehensive Range of Business Products
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 TrendsCybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
Cybersercurity Resource Allocation & Efficacy Index: 2020 - 2021 Trends
 
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...Cybersecurity Insiders Webinar  - Zero Trust: Best Practices for Securing the...
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Safend General Presentation 2010
Safend General Presentation 2010Safend General Presentation 2010
Safend General Presentation 2010
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
 
Governance fail security fail
Governance fail security failGovernance fail security fail
Governance fail security fail
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Veezo - Virtual Security Officer
Veezo - Virtual Security OfficerVeezo - Virtual Security Officer
Veezo - Virtual Security Officer
 

Viewers also liked

CSMO0215WBTT - Client Command Suite Overview
CSMO0215WBTT - Client Command Suite OverviewCSMO0215WBTT - Client Command Suite Overview
CSMO0215WBTT - Client Command Suite OverviewEmmanuelselepe
 
REALIDAD HIPÓTESIS MODELOS REALIDAD
REALIDAD HIPÓTESIS MODELOS REALIDADREALIDAD HIPÓTESIS MODELOS REALIDAD
REALIDAD HIPÓTESIS MODELOS REALIDADCristina Dino
 
ABF Journal You say tomato article
ABF Journal You say tomato articleABF Journal You say tomato article
ABF Journal You say tomato articleGraham Wedlake
 
Enterprise Support Services Portfolio Overview
Enterprise Support Services Portfolio OverviewEnterprise Support Services Portfolio Overview
Enterprise Support Services Portfolio Overviewkareem khater
 
MASTERCHEF – DOUGHNUTS AND CRUSTACEANS
MASTERCHEF – DOUGHNUTS AND CRUSTACEANSMASTERCHEF – DOUGHNUTS AND CRUSTACEANS
MASTERCHEF – DOUGHNUTS AND CRUSTACEANSJovel Garcia
 
Cover LEtter_cdiaz_linkedin
Cover LEtter_cdiaz_linkedinCover LEtter_cdiaz_linkedin
Cover LEtter_cdiaz_linkedinCarlos Diaz
 
Axa penzijni pripojisteni
Axa penzijni pripojisteniAxa penzijni pripojisteni
Axa penzijni pripojistenireformapenzi
 
Proyecto facil y seguro para lograr la universal diaria asistencia y limpieza...
Proyecto facil y seguro para lograr la universal diaria asistencia y limpieza...Proyecto facil y seguro para lograr la universal diaria asistencia y limpieza...
Proyecto facil y seguro para lograr la universal diaria asistencia y limpieza...La Gatera de la Villa
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
3 apresentação implementação do pge 2015 videoconferencia dia 13 e 14-08-15
3 apresentação implementação do pge 2015   videoconferencia dia 13 e 14-08-153 apresentação implementação do pge 2015   videoconferencia dia 13 e 14-08-15
3 apresentação implementação do pge 2015 videoconferencia dia 13 e 14-08-15NTEPatrocinio
 
DELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC Technologies
 
Design and Engineering Module 3: Prototype to Product
Design and Engineering Module 3: Prototype to ProductDesign and Engineering Module 3: Prototype to Product
Design and Engineering Module 3: Prototype to ProductNaseel Ibnu Azeez
 
Alda popeye
Alda popeyeAlda popeye
Alda popeyeOECD CFE
 

Viewers also liked (16)

第五組:府城歷史
第五組:府城歷史第五組:府城歷史
第五組:府城歷史
 
CSMO0215WBTT - Client Command Suite Overview
CSMO0215WBTT - Client Command Suite OverviewCSMO0215WBTT - Client Command Suite Overview
CSMO0215WBTT - Client Command Suite Overview
 
REALIDAD HIPÓTESIS MODELOS REALIDAD
REALIDAD HIPÓTESIS MODELOS REALIDADREALIDAD HIPÓTESIS MODELOS REALIDAD
REALIDAD HIPÓTESIS MODELOS REALIDAD
 
ABF Journal You say tomato article
ABF Journal You say tomato articleABF Journal You say tomato article
ABF Journal You say tomato article
 
Enterprise Support Services Portfolio Overview
Enterprise Support Services Portfolio OverviewEnterprise Support Services Portfolio Overview
Enterprise Support Services Portfolio Overview
 
MASTERCHEF – DOUGHNUTS AND CRUSTACEANS
MASTERCHEF – DOUGHNUTS AND CRUSTACEANSMASTERCHEF – DOUGHNUTS AND CRUSTACEANS
MASTERCHEF – DOUGHNUTS AND CRUSTACEANS
 
Cover LEtter_cdiaz_linkedin
Cover LEtter_cdiaz_linkedinCover LEtter_cdiaz_linkedin
Cover LEtter_cdiaz_linkedin
 
Axa penzijni pripojisteni
Axa penzijni pripojisteniAxa penzijni pripojisteni
Axa penzijni pripojisteni
 
Proyecto facil y seguro para lograr la universal diaria asistencia y limpieza...
Proyecto facil y seguro para lograr la universal diaria asistencia y limpieza...Proyecto facil y seguro para lograr la universal diaria asistencia y limpieza...
Proyecto facil y seguro para lograr la universal diaria asistencia y limpieza...
 
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
3 apresentação implementação do pge 2015 videoconferencia dia 13 e 14-08-15
3 apresentação implementação do pge 2015   videoconferencia dia 13 e 14-08-153 apresentação implementação do pge 2015   videoconferencia dia 13 e 14-08-15
3 apresentação implementação do pge 2015 videoconferencia dia 13 e 14-08-15
 
DELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_CompleteDELLEMC_Portfolio_hyperlinks_Complete
DELLEMC_Portfolio_hyperlinks_Complete
 
DELL cert
DELL certDELL cert
DELL cert
 
Ebiz express magazine
Ebiz express magazineEbiz express magazine
Ebiz express magazine
 
Design and Engineering Module 3: Prototype to Product
Design and Engineering Module 3: Prototype to ProductDesign and Engineering Module 3: Prototype to Product
Design and Engineering Module 3: Prototype to Product
 
Alda popeye
Alda popeyeAlda popeye
Alda popeye
 

Similar to Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity and cost with Dell Data Protection and Encryption, James Meakin, Product Specialist DDP, Dell

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SIMicrosoft Ideas
 
Achieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email SecurityAchieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email SecurityDell World
 
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataPRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataBlackBerry
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell securityRonny Stavem
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionVTECH SOLUTION
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story BookSmart Defend UK
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and FinanceSierraware
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityIvanti
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDMGreg Cranley
 

Similar to Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity and cost with Dell Data Protection and Encryption, James Meakin, Product Specialist DDP, Dell (20)

MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Achieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email SecurityAchieving Deeper Network, Mobile and Email Security
Achieving Deeper Network, Mobile and Email Security
 
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataPRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your Data
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
The smartdefend Story Book
The smartdefend Story BookThe smartdefend Story Book
The smartdefend Story Book
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Mobile Security for Banking and Finance
Mobile Security for Banking and FinanceMobile Security for Banking and Finance
Mobile Security for Banking and Finance
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 

More from Kenneth de Brucq

Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...Kenneth de Brucq
 
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...Kenneth de Brucq
 
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready ITDell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready ITKenneth de Brucq
 
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...Kenneth de Brucq
 
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...Kenneth de Brucq
 
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...Kenneth de Brucq
 
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Kenneth de Brucq
 
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...Kenneth de Brucq
 
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...Kenneth de Brucq
 
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...Kenneth de Brucq
 
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...Kenneth de Brucq
 
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...Kenneth de Brucq
 
VMware EVO - Fremtidens datarom er hyperkonvergert
VMware EVO - Fremtidens datarom er hyperkonvergertVMware EVO - Fremtidens datarom er hyperkonvergert
VMware EVO - Fremtidens datarom er hyperkonvergertKenneth de Brucq
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionKenneth de Brucq
 
Virtualization performance management
Virtualization performance managementVirtualization performance management
Virtualization performance managementKenneth de Brucq
 
Modernize & transform your network
Modernize & transform your network Modernize & transform your network
Modernize & transform your network Kenneth de Brucq
 
Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!Kenneth de Brucq
 
Dell SSD og Flash teknologi i SAN
Dell SSD og Flash teknologi i SANDell SSD og Flash teknologi i SAN
Dell SSD og Flash teknologi i SANKenneth de Brucq
 

More from Kenneth de Brucq (20)

Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
 
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
 
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready ITDell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
 
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
 
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
 
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
 
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
 
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
 
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
 
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
 
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
 
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
 
VMware EVO - Fremtidens datarom er hyperkonvergert
VMware EVO - Fremtidens datarom er hyperkonvergertVMware EVO - Fremtidens datarom er hyperkonvergert
VMware EVO - Fremtidens datarom er hyperkonvergert
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
 
Virtualization performance management
Virtualization performance managementVirtualization performance management
Virtualization performance management
 
Optimalisert datasenter
Optimalisert datasenterOptimalisert datasenter
Optimalisert datasenter
 
Modernize & transform your network
Modernize & transform your network Modernize & transform your network
Modernize & transform your network
 
Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!
 
Dell SSD og Flash teknologi i SAN
Dell SSD og Flash teknologi i SANDell SSD og Flash teknologi i SAN
Dell SSD og Flash teknologi i SAN
 

Recently uploaded

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 

Recently uploaded (20)

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity and cost with Dell Data Protection and Encryption, James Meakin, Product Specialist DDP, Dell

  • 1. Endpoint Security - How to Balance Productivity and Security James MEAKIN 8th September 2015
  • 2. Why are business prioritizing data security? 07/09/20152 average amount paid following a security breach, up from $5.4M in 2013.3 the cost per lost or stolen record increased over the last year from $188 to $201.3 increase in records compromised due to a security breach since 2013.2 87% 29.4% of organizations have experienced a security breach in the last 12 months.1 >75M records have been compromised this year in approximately 568 breaches.2 of companies concerned about lack of control and security in the Cloud.4 73%$201 $5.9M !
  • 3. Market trends are increasing pressure on endpoint security 07/09/20153 Compliance Pressures 75% of organizations lack resources to meet compliance regulations. 73% say increasing audit burden is their biggest challenge.3 Evolving User Behavior 200 million employees bring their own device to work.1 66% use free file-sharing platforms to share corporate data.2 Data Explosion 2.5 quintillion bytes of data created every day, and end users are accessing it everywhere.4 Growing Threats In just one month, 280 million malicious programs, 134 million Web-borne infections, and 24 million malicious URLs are detected.5 Endpoint Security 1. Mobile Is The New Face Of Engagement, Forrester Research, February 2012 2. Workforce Mobilization: What Your I.T. Department Should Know, SkyDox, June 2012 3. 2013 State of the Endpoint, Ponemon Institute, December 2012 4. Understanding Big Data, IBM 5. Kaspersky April 2012 Threat Report
  • 4. The IT balancing act 07/09/20154 End user demands Data protection How do you balance end user expectations to work when and where they want, on any device with the need to protect data and meet compliance?
  • 5. The concept of Risk 07/09/20155 The potential that a given threat will exploit vulnerabilities and thereby cause harm. It is measured by the probability of occurrence and its impact.
  • 6. Assessing Endpoint Risk 07/09/20156 Considerable Average Probability of occurrence Impact Very Substantial Irreversible Low Low High ……… Region of acceptable risk Region of unacceptable risk Principal Endpoint Threats • PC theft • PC lost • Hardware failure • Virus/Malware • Inappropriate use • Intrusion • Weak passwords • Compliance
  • 7. What technologies help protect against these threats? 07/09/20157 Threats Technology Stolen or Lost PC Encryption Hardware Failure Back-Up Virus / APT / 0 day Anti-malware Remote access/ Intrusion Anti malware & personal Firewall Inappropriate use Personal Firewall & Web filters Weak passwords Strong Authentication Compliance Encryption
  • 9. 07/09/20159 Dell Data Security Solutions responds to all these challenges.
  • 10. 10 Dell Connected Security portfolio Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov Security Services Incident Response Managed Security Svcs Security & Risk Consult Threat Intelligence Endpoint DDP | Encryption DDP | Protected Workspace DDP | Security Tools Configuration & Patch Management Mobile Management & Workspace Network Next Gen Firewall Secure Mobile Access Email Security
  • 11. Dell’s most secure commercial PCs with Dell Data Protection Portfolio of endpoint security solutions 07/09/201511 AuthenticationEncryption Threat Protection DDP | Encryption DDP | Security Tools DDP | Protected Workspace DDP | Endpoint Security Suite Integrated authentication, encryption & threat protection, centrally managed via a single console
  • 12. Dell Data Protection | Encryption BitLocker Manager Centrally managed via the DDP | E console Begin with software encryption Hardware encryption for enhanced performance Personal Edition Locally managed for Dell & non-Dell systems Enterprise Edition Centrally managed for Dell & non-Dell Systems Hardware Crypto Accelerator FIPS 140-2 Level 3 validated Self-Encrypting Drives (SED) Fully integrated authentication, management & reporting Mobile Edition Centrally manage Android and iOS security Cloud Edition Encrypt files in DropBox, Box & other public cloud storage External Media Edition Add to BitLocker or SED for complete protection And protect data wherever it goes
  • 13. 07/09/201513 Dell Data Protection | Security Tools Flexible, secure solutions to keep unauthorized users out of your data and your business Embedded in all Latitude laptops and Dell Precision mobile workstations Hardware based multi-factory login solutions ControlVault™ Keeps user passwords and credentials on a separately controlled hardware chip for secure authentication Smart Cards Integrated Contact & contactless smart card reader Fingerprint Integrated and 3rd party fingerprint reader support Pre-boot Pre-boot authentication with single sign-on Improve your login security
  • 14. Dell Data Protection | Security Tools Comprehensive lineup of authentication options 07/09/201514 Dell ControlVault Security Processor • Keeps user passwords and credentials on a separately controlled hardware chip for secure authentication • Isolates fingerprint processing and storage from OS and physical hard drives for ultimate protection against potential compromise • Embedded in all Latitude laptops and Dell Precision mobile workstations Fingerprint Processing Processes and stores fingerprint credentials on FIPS 201 compliant memory chip Single Sign-On Simple, secure access with pre- boot/ pre-Windows authentication all the way through Active Directory log on Smartcard Controller Contact or contact- less SC support, HID iClass or FIPS 201 PIV cardsControlVault
  • 15. Next Generation DDP | Security Tools 07/09/201515 • DDP | Security Tools pairs with the Security Tools mobile app • End-users can reset a Windows password on their Dell PC, eliminating a call to the service desk • Password reset is protected with embedded hardware and the use of one-time passwords >30% of IT service desk calls are for password reset
  • 16. Dell Data Protection | Protected Workspace Works with traditional malware protection to better address the modern threat landscape 07/09/201516 Segregate untrusted content Launches the most highly targeted apps—Web browsers, PDF readers, Office apps, Zip files and Exe files—in a contained virtual environment or “sandbox” to protect against direct attack Detection Spot all forms of malware Uses behavioral-based malware identification to detect any malicious behavior – both known and zero-day attacks that the AV/AM software hasn’t learned of yet Prevention Stop malware in its tracks Immediately stops the attack in its tracks, disposes of the tainted sandbox, and restores the secure virtual environment Containment
  • 17. 07/09/201517 Dell Data Protection | Endpoint Security Suite A single integrated solution that protects your business, data, systems, users and reputation Authentication Encryption • FIPS 201 smartcards • Fingerprint • Windows password reset via smartphone • Multi-factor • Encrypt local drives & external media • Optional hardware encryption • Agentless Android & iOS security • BitLocker & SED support Threat protection • Anti-virus • Anti-spyware • Host firewall • Web Content filtering • Server threat alerts Simplified management Single pane of glass Consolidated status and compliance reporting Virtual console options
  • 18. Only Dell offers the complete portfolio of endpoint security solutions with the capability to address these challenges Complete portfolio of encryption solutions Protect data no matter where end users take it. Advanced malware protection Proactively protect users and data against daily threats that traditional anti-virus solutions can’t block. Advanced Authentication The largest portfolio of integrated authentication solutions that includes fingerprint and smart card support.
  • 19. The high cost of doing nothing Luke Shutler Strategic Alliances Manager
  • 20. © 2015 Absolute Software Corporation.All rights reserved. 20
  • 21. © 2015 Absolute Software Corporation.All rights reserved. 21 1. The regulation will apply across Europe 2. Companies are liable to fines of up to 5 percent of their corporation’s annual global turnover 3. Companies will have to notify those whose data has been breached 4. Organisations must notify the authorities about data breaches as soon as possible 5. Companies with 250 or more employees have to employ a corporate data protection officer 5 Things to consider Changes in EUGDPR Legislation 2017
  • 22. © 2015 Absolute Software Corporation.All rights reserved. 22 HOW WE DO IT WHAT WE DO Our Persistence® technology is embedded into the core of most Dell devices at the factory. Once activated, it provides you with comprehensive visibility into all of your devices allowing you to confidently manage mobility, investigate potential threats, and take action if a security incident occurs. Most importantly, you can apply remote security measures to protect each device and the data it contains. No other technology can do this. Absolute® provides persistent endpoint security and data risk management solutions for computers, tablets, and smartphones. Our customers depend on us to provide them with a unique and trusted layer of security so they can manage mobility while remaining firmly in control. By providing them with a reliable two-way connection with all of their devices, our customers can secure endpoints, assess risk, and respond appropriately to security incidents.
  • 23. © 2015 Absolute Software Corporation.All rights reserved. 23 Persistence® technology from Absolute provides you with visibility and control over all of your devices, regardless of user or location. 1. Dell embed Persistence technology into the firmware of devices at the factory 2. Once the Absolute software agent is installed, Persistence is activated 3. An automatic reinstallation is triggered if an Absolute software client is removed from a device 4. The reinstallation will occur even if the firmware is flashed, the device is reimaged, the hard drive is replaced, or if a tablet or smartphone is wiped clean to factory settings HOW IT WORKS: Persistence Technology
  • 24. © 2015 Absolute Software Corporation.All rights reserved. 24 REPORTING & ANALYTICS GEOTECHNOLOGY RISK ASSESSMENT RISK RESPONSE ENDPOINT INVESTIGATIONS Feature Categories
  • 25. = 25© 2015 Absolute Software Corporation.All rights reserved.