SlideShare a Scribd company logo
1 of 19
Download to read offline
Dell World 2014 
Enabling mobility without compromising security 
Roger Bjork, Sr. Product Manager 
Dell World 2014
Dell World 2014 
The opportunity and the challenge1 
1/3 
of employees exclusively use mobile devices to do their work 
61% 
of respondents report that mobile devices have increased productivity 
of organizations still have absolutely no security features in place to support mobility / security is inadequate 
30%/74% 
20,000->28,000 average number of mobile devices managed in large companies 
52% 
security practices have been sacrificed to improve productivity 
1. Ponemon Institute, Raytheon, 9/22/14: http://www.darkreading.com/operations/mobile-only-employee-trend-could-break-security- models/d/d-id/1315960?_mc=RSS_DR_EDT 
$278 
cost to manage devices securely
Dell World 2014 
Controls? 
Access? 
Network? 
Device? 
Secure? 
Compromised? 
Jail broken? 
Threats? 
The real problem: We are focused on the wrong thing 
Devices 
Data
Dell World 2014 
Five-step framework to securely enable mobility 
Secure Mobile Strategy 
Text 
Text 
Text 
Text 
Secure Access 
•Provide access to the right resources 
•Govern applications, data and privileged users 
•Enable a secure, encrypted tunnel to corporate resources 
Secure Data 
•Encrypt & decrypt data 
•Centralize & simplify management across multiple environments 
•Set policies to wipe data 
Secure Endpoint 
•Securely manage endpoints & containers 
•Manage and provision access 
•Automate device discovery & inventory 
•Create separate work environments 
Secure Network 
•Protect network & prevent intrusions 
•Scale to offer protection without performance tradeoff 
•Define mobile strategy and roadmap & training 
•Establish response to threats
Dell World 2014 
Secure mobile strategy 
Drives informed decisions through an established, repeatable process, 
now and in the future 
Understand 
Deeper dive 
•Large enterprise 
•Holistic view 
•Deep dive in multiple target areas 
•Customized 
Mobile device audit 
User productivity workflows 
Mobile content management 
Mobile device management
Dell World 2014 
Secure identity 
Provide business-driven access control and governance 
for users and privileged accounts 
Control data and user access – not just the device. 
provides secure access to resources, 
protects systems from direct exposure 
Foundation 
Enforce policy 
Enhance security 
Provide unique user sessions 
Gain awareness
Dell World 2014 
Secure mobile access 
Policy-enforced mobile access to mission-critical data and applications without compromising security 
Secure SSL VPN connection and granular network access controls 
Context-aware authentication and device interrogation to restrict access to authorized users and trusted devices 
One-click mobile access to authorized corporate applications and resources 
Centralized access control policy management for efficient administration 
Secure Mobile Access appliance 
Mobile Connect app 
8.1
Dell World 2014 
Secure data 
Comprehensive protection 
Protect data on any device, external media and in the cloud with flexible options, including the highest level of FIPS 140-2 protection. 
Deploy, enforce and audit compliance policies with pre-set compliance templates and policies. 
Easier compliance 
Save time with automatic deployment and provisioning, centralized management, and seamless integration with IT processes. 
Simplified management 
Enable end users to securely work anytime, anywhere, on any device without disruption. 
End user productivity 
Dell Data Protection Platform 
Protect data from device to the cloud 
Windows 
BitLocker 
SEDs 
Cloud 
Windows or Mac 
Laptops / Desktops 
Removable Media 
Full Disk 
Encryption 
Tablets and 
Smartphones
Dell World 2014 
Secure network 
Gateway protection, inspection for SSL encrypted sessions, and application intelligence and control 
Provide deeper network security for corporate data and protect from threats 
•Automatically block attacks 
•Automatically identify applications by their DNA 
•Single sign-on to identify users 
•Illuminate all application traffic on the network 
•Control by application and user
Dell World 2014 
Support devices, users, mobile strategy without the complexity 
•Complete, secure endpoint management 
•Secure enterprise workspace on all devices 
•Secure access to enterprise data 
•Integrated console management 
•User self-service 
•Identity management 
•Business apps and services you need 
•Flexibility for future-proofing 
Secure endpoint 
Comprehensive mobile enablement 
Endpoint management 
Workspace management 
Mobile 
Management 
System Management 
Mobile 
Workspace 
Desktop Workspace
Dell World 2014 
Five-step framework to securely enable mobility 
Secure Mobile Strategy 
Text 
Text 
Text 
Text 
Secure Access 
•Provide access to the right resources 
•Govern applications, data and privileged users 
•Enable a secure, encrypted tunnel to corporate resources 
Secure Data 
•Encrypt & decrypt data 
•Centralize & simplify management across multiple environments 
•Set policies to wipe data 
Secure Endpoint 
•Securely manage endpoints & containers 
•Manage and provision access 
•Automate device discovery & inventory 
•Create separate work environments 
Secure Network 
•Protect network & prevent intrusions 
•Scale to offer protection without performance tradeoff 
•Define mobile strategy and roadmap & training 
•Establish response to threats Dell SecureWorks Mobile Security Services & Solutions 
Dell One Identity Solutions 
Dell SonicWALL Secure Mobile Access 
Dell Data Protection – Mobile Edition 
Dell Enterprise Mobile Management 
Dell KACE 
Dell SonicWALL Next- Generation Firewalls
Dell World 2014 
How Dell sees mobility done securely 
100% cloud enabled, self-serviced 
Rich user experience delivered as a single app on user’s device; private and secure 
Single subscription charge for best-in-breed productivity services 
Single point of integration into IT infrastructure (AD) 
Secure workspace attributes include data leakage protection, secure remote access, identity management, encryption, and management functions 
Voice & Messaging Dell Business Phone 
File sync and share 
Box for Dell 
Email, cal, contacts 
Microsoft Office 365 
Corporate web apps 
Mobile Connect SMA 
Secure workspace 
Dell Mobile Workspace 
Mobile productivity 
Reduce IT costs, simplify deployment complexity, provide faster employee time-to-productivity, deliver complete employee privacy and freedom
Dell World 2014 
Snapshot 
• Public school district with 
26,000 students and 4,800 
teachers /staff 
• 21 elementary schools, six middle 
schools and seven high schools 
Challenge 
District is tasked with securing on its network over 
9,000 student and employee mobile devices at 
any one time. 
Results 
• By deploying a Dell SonicWALL solution, district cuts costs 
by 50% 
• Students increase access to critical educational resources; teachers 
can access other schools around the world 
• Mobile device users are authenticated, ensuring secure BYOD
Dell World 2014 
The Dell difference: Security designed for a connected world 
•Integrated, comprehensive portfolio secures from device to datacenter to cloud 
•Shared intelligence across silos eliminates proprietary islands of information that create security gaps 
•Considers the human factor to “keep the good guys good” without getting in the way of user productivity 
Enable the enterprise to embrace new technologies faster than the competition 
Comply 
with regulations and achieve consistent, reliable governance 
Protect 
the whole enterprise – outside in and inside out – efficiently and proactively
Dell World 2014 
Dell delivers best-in class security solutions 
Identity & Access Mgmt 
Identity Governance 
Privileged Mgmt 
Access Mgmt 
Compliance & IT Gov 
Security Services 
Incident Response 
Managed Security Svcs 
Security & Risk Consult 
Threat Intelligence 
Data/Endpoint 
Encryption 
Protected Workspace 
Configuration & Patch Management 
Secure Cloud Client 
Network 
Next Gen Firewall 
Secure Mobile Access 
Email Security
Dell World 2014 
Dell Security leadership, scale and recognition 
Validated by the industry 
•#1 ranked company in Security 500 
•NSS Labs “Recommended” Firewall & IPS – 3 years in row 
•Overall Leader in Access Governance, Kuppinger Cole 
•Best Security Service, Cloud Security, Compliance, Info Security Products Guide 
•Recommended by SC Magazine 
•Major Player, Email Security, IDC 
•6 Gartner Magic Quadrants 
76B cyber events analyzed daily 
2m devices WW reporting on 40m users 
5.9B security events of interest daily 
Dell SecureWorks 
$14 trillion in assets protected daily 
1.06 trillion IPS incidents detected & blocked 
5,000 security incidents escalated daily 
1.78 billion malware downloads blocked 
Dell SonicWALL 
Dell Data Protection Encryption 
Data encrypted and protected on 7m devices 
Dell Identity and Access Management 
110m managed identities 
2,000+ security professionals worldwide
Dell World 2014 
Next steps 
Visit the Security deep dive area, or the Protect lane in the Solutions Expo to see a demo 
Attend other Security sessions: 
•MT23: Data Protection for Data Everywhere: Utilizing Context-Aware Security Controls 
•MT25: Overcoming Compliance Challenges: A 5-Step Path to Governance 
Dig in at the Hands on Lab
Dell World 2014 
Thank you.
Want to learn more about 
Dell’s security solutions? 
Learn via email. Start here. 
Sign me up!

More Related Content

Viewers also liked

Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ssGraham Chalk
 
CIS14: Building Blocks for Mobile Authentication and Security
CIS14: Building Blocks for Mobile Authentication and SecurityCIS14: Building Blocks for Mobile Authentication and Security
CIS14: Building Blocks for Mobile Authentication and SecurityCloudIDSummit
 
Security and Privacy in the current e-mobility charging infrastructure
Security and Privacy in the current e-mobility charging infrastructureSecurity and Privacy in the current e-mobility charging infrastructure
Security and Privacy in the current e-mobility charging infrastructureAchim Friedland
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Andris Soroka
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 

Viewers also liked (7)

Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
 
CIS14: Building Blocks for Mobile Authentication and Security
CIS14: Building Blocks for Mobile Authentication and SecurityCIS14: Building Blocks for Mobile Authentication and Security
CIS14: Building Blocks for Mobile Authentication and Security
 
Security and Privacy in the current e-mobility charging infrastructure
Security and Privacy in the current e-mobility charging infrastructureSecurity and Privacy in the current e-mobility charging infrastructure
Security and Privacy in the current e-mobility charging infrastructure
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Mobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjaliMobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjali
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 

More from Dell World

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking OverviewDell World
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage ManagementDell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell World
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeDell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notDell World
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
 

More from Dell World (20)

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 

Recently uploaded

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024Matteo Carbone
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 

Recently uploaded (20)

Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
IoT Insurance Observatory: summary 2024
IoT Insurance Observatory:  summary 2024IoT Insurance Observatory:  summary 2024
IoT Insurance Observatory: summary 2024
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 

Enabling Mobility Without Compromising Security

  • 1. Dell World 2014 Enabling mobility without compromising security Roger Bjork, Sr. Product Manager Dell World 2014
  • 2. Dell World 2014 The opportunity and the challenge1 1/3 of employees exclusively use mobile devices to do their work 61% of respondents report that mobile devices have increased productivity of organizations still have absolutely no security features in place to support mobility / security is inadequate 30%/74% 20,000->28,000 average number of mobile devices managed in large companies 52% security practices have been sacrificed to improve productivity 1. Ponemon Institute, Raytheon, 9/22/14: http://www.darkreading.com/operations/mobile-only-employee-trend-could-break-security- models/d/d-id/1315960?_mc=RSS_DR_EDT $278 cost to manage devices securely
  • 3. Dell World 2014 Controls? Access? Network? Device? Secure? Compromised? Jail broken? Threats? The real problem: We are focused on the wrong thing Devices Data
  • 4. Dell World 2014 Five-step framework to securely enable mobility Secure Mobile Strategy Text Text Text Text Secure Access •Provide access to the right resources •Govern applications, data and privileged users •Enable a secure, encrypted tunnel to corporate resources Secure Data •Encrypt & decrypt data •Centralize & simplify management across multiple environments •Set policies to wipe data Secure Endpoint •Securely manage endpoints & containers •Manage and provision access •Automate device discovery & inventory •Create separate work environments Secure Network •Protect network & prevent intrusions •Scale to offer protection without performance tradeoff •Define mobile strategy and roadmap & training •Establish response to threats
  • 5. Dell World 2014 Secure mobile strategy Drives informed decisions through an established, repeatable process, now and in the future Understand Deeper dive •Large enterprise •Holistic view •Deep dive in multiple target areas •Customized Mobile device audit User productivity workflows Mobile content management Mobile device management
  • 6. Dell World 2014 Secure identity Provide business-driven access control and governance for users and privileged accounts Control data and user access – not just the device. provides secure access to resources, protects systems from direct exposure Foundation Enforce policy Enhance security Provide unique user sessions Gain awareness
  • 7. Dell World 2014 Secure mobile access Policy-enforced mobile access to mission-critical data and applications without compromising security Secure SSL VPN connection and granular network access controls Context-aware authentication and device interrogation to restrict access to authorized users and trusted devices One-click mobile access to authorized corporate applications and resources Centralized access control policy management for efficient administration Secure Mobile Access appliance Mobile Connect app 8.1
  • 8. Dell World 2014 Secure data Comprehensive protection Protect data on any device, external media and in the cloud with flexible options, including the highest level of FIPS 140-2 protection. Deploy, enforce and audit compliance policies with pre-set compliance templates and policies. Easier compliance Save time with automatic deployment and provisioning, centralized management, and seamless integration with IT processes. Simplified management Enable end users to securely work anytime, anywhere, on any device without disruption. End user productivity Dell Data Protection Platform Protect data from device to the cloud Windows BitLocker SEDs Cloud Windows or Mac Laptops / Desktops Removable Media Full Disk Encryption Tablets and Smartphones
  • 9. Dell World 2014 Secure network Gateway protection, inspection for SSL encrypted sessions, and application intelligence and control Provide deeper network security for corporate data and protect from threats •Automatically block attacks •Automatically identify applications by their DNA •Single sign-on to identify users •Illuminate all application traffic on the network •Control by application and user
  • 10. Dell World 2014 Support devices, users, mobile strategy without the complexity •Complete, secure endpoint management •Secure enterprise workspace on all devices •Secure access to enterprise data •Integrated console management •User self-service •Identity management •Business apps and services you need •Flexibility for future-proofing Secure endpoint Comprehensive mobile enablement Endpoint management Workspace management Mobile Management System Management Mobile Workspace Desktop Workspace
  • 11. Dell World 2014 Five-step framework to securely enable mobility Secure Mobile Strategy Text Text Text Text Secure Access •Provide access to the right resources •Govern applications, data and privileged users •Enable a secure, encrypted tunnel to corporate resources Secure Data •Encrypt & decrypt data •Centralize & simplify management across multiple environments •Set policies to wipe data Secure Endpoint •Securely manage endpoints & containers •Manage and provision access •Automate device discovery & inventory •Create separate work environments Secure Network •Protect network & prevent intrusions •Scale to offer protection without performance tradeoff •Define mobile strategy and roadmap & training •Establish response to threats Dell SecureWorks Mobile Security Services & Solutions Dell One Identity Solutions Dell SonicWALL Secure Mobile Access Dell Data Protection – Mobile Edition Dell Enterprise Mobile Management Dell KACE Dell SonicWALL Next- Generation Firewalls
  • 12. Dell World 2014 How Dell sees mobility done securely 100% cloud enabled, self-serviced Rich user experience delivered as a single app on user’s device; private and secure Single subscription charge for best-in-breed productivity services Single point of integration into IT infrastructure (AD) Secure workspace attributes include data leakage protection, secure remote access, identity management, encryption, and management functions Voice & Messaging Dell Business Phone File sync and share Box for Dell Email, cal, contacts Microsoft Office 365 Corporate web apps Mobile Connect SMA Secure workspace Dell Mobile Workspace Mobile productivity Reduce IT costs, simplify deployment complexity, provide faster employee time-to-productivity, deliver complete employee privacy and freedom
  • 13. Dell World 2014 Snapshot • Public school district with 26,000 students and 4,800 teachers /staff • 21 elementary schools, six middle schools and seven high schools Challenge District is tasked with securing on its network over 9,000 student and employee mobile devices at any one time. Results • By deploying a Dell SonicWALL solution, district cuts costs by 50% • Students increase access to critical educational resources; teachers can access other schools around the world • Mobile device users are authenticated, ensuring secure BYOD
  • 14. Dell World 2014 The Dell difference: Security designed for a connected world •Integrated, comprehensive portfolio secures from device to datacenter to cloud •Shared intelligence across silos eliminates proprietary islands of information that create security gaps •Considers the human factor to “keep the good guys good” without getting in the way of user productivity Enable the enterprise to embrace new technologies faster than the competition Comply with regulations and achieve consistent, reliable governance Protect the whole enterprise – outside in and inside out – efficiently and proactively
  • 15. Dell World 2014 Dell delivers best-in class security solutions Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov Security Services Incident Response Managed Security Svcs Security & Risk Consult Threat Intelligence Data/Endpoint Encryption Protected Workspace Configuration & Patch Management Secure Cloud Client Network Next Gen Firewall Secure Mobile Access Email Security
  • 16. Dell World 2014 Dell Security leadership, scale and recognition Validated by the industry •#1 ranked company in Security 500 •NSS Labs “Recommended” Firewall & IPS – 3 years in row •Overall Leader in Access Governance, Kuppinger Cole •Best Security Service, Cloud Security, Compliance, Info Security Products Guide •Recommended by SC Magazine •Major Player, Email Security, IDC •6 Gartner Magic Quadrants 76B cyber events analyzed daily 2m devices WW reporting on 40m users 5.9B security events of interest daily Dell SecureWorks $14 trillion in assets protected daily 1.06 trillion IPS incidents detected & blocked 5,000 security incidents escalated daily 1.78 billion malware downloads blocked Dell SonicWALL Dell Data Protection Encryption Data encrypted and protected on 7m devices Dell Identity and Access Management 110m managed identities 2,000+ security professionals worldwide
  • 17. Dell World 2014 Next steps Visit the Security deep dive area, or the Protect lane in the Solutions Expo to see a demo Attend other Security sessions: •MT23: Data Protection for Data Everywhere: Utilizing Context-Aware Security Controls •MT25: Overcoming Compliance Challenges: A 5-Step Path to Governance Dig in at the Hands on Lab
  • 18. Dell World 2014 Thank you.
  • 19. Want to learn more about Dell’s security solutions? Learn via email. Start here. Sign me up!