May 2013
The Power to Do More
with Dell Connected Security
DSG within
Dell
Security
within DSG
2
Software is an integral part of the Dell strategy
Delivering end- to- end solutions with scalable, mid- market design point
Servers, Networking and Storage
Services & Cloud
End-User Computing
Software
End-to-end
ITSolutions
Scalable,designpoint
End- user
computing
Services,
Security, Cloud
Server, storage and
networking capabilities
Software that leverages Dell core strengths
No legacy to protect
Dell Software leverages our core strengths
Dell Software solutions
Data center & cloud
management
• Client management
• Performance management
• Virtualization & cloud mgmt
• Windows server mgmt
• Mobile device mgmt
• Desktop virtualization
• Application/data access
• Secure remote access
Information
management
• Database management
• Business intelligence/analytics
• Application & data integration
• Big data analytics
Mobile workforce
management
• Identity & access management
• Network security
• Endpoint security
• Email security
Security Data protection
• Enterprise backup/recovery
• Virtual protection
• Application protection
• Disaster recovery
New malware samples
discovered by researchers every
day, according to Georgia Tech100,000
$5.5MAverage cost of a data breach in
2011, according to Ponemon
Institute research
Estimated cost to US
businesses from data
breaches in 2011, says Online
Trust Alliance
$6.5B
60%
7,000+
New vulnerabilities
tracked in 2011 by the
Counter Threat Unit
New malware samples detected by
Antivirus solutions, Cyveillance study
shows
19%Estimated number of
healthcare providers with
2 or more breaches in the
last two years
Trends force changes in the way you do business.
A changing IT landscape = security challenges = RISK
Trends
Security
Challenges
Cloud
BYOD
Virtualization &
new technologies
Patchwork of vendor
solutions => disjointed &
siloed
Explosive data growth
$
Limited budget and
expertise
Time & complexity of
management & reporting
Insufficient visibility and
counter measures
Compliance
Advanced persistent
threats, breaches, attacks,
malware
Threats?
What threats?
9
Threats & Attacks are constantly increasing and evolving
11
Evolutions
within
companies
18
Users are Increasingly Out of Your Control
Day
Extenders
Home Office
Users
Traveling
Executives
Kiosks/Public
Machine Users
Tablets & Smart
Phone Users
Wireless LAN
Users
VOIP Users
Business
Partners/
Extranet Users
Internal Users External Users
More…
 Devices
 Saas/Hosted Apps
 Social Media
 Network environments
 Mobility
Saas, Web 2.0
Real-Time Apps
Why Mobile Devices Could Be Risky?
20
Were not protected
with mobile security
features1
57%
Of lost laptops
contained confidential
data1
46%Average value of lost
laptop1
$49,246
$5.5M
IT managers are looking for ways to:
+ Fully protect data wherever it goes
without disrupting end users
+ Save time deploying and managing
security
+ Ensure they remain in compliance
+ Flexible scale to ensure they meet the
requirements of different users
Data is the most important asset
companies own:
+ Intellectual Property
+ Customer and employee data
+ Competitive information
Source: 1. Poneman Institute Study
Source: 2 Symantec & Poneman Institute Study: US cost of a Data Breach, 2011
Average organizational
cost of a data breach2
Every 53 Seconds a laptop is stolen
Dell Solutions Tour
Does Dell Have an Answer and
Why Dell?
- Of course because Dell’s in the problem
solving business. Let’s talk about why Dell
for IT security.
Dell Solutions Tour
Dell Solutions Tour
Dell
belief:
there is a
better
way
Silos and layers add stress to your
resources
• Difficult to get to work together
• Limited security resources
Individual job done well in silos
• Solutions often don’t work together
• Solutions don’t work across
the business
The problem: Today, layers and silos get the security job
done but often have gaps = business risk
Our POV: Connected Security for a connected world
Connected Security is security that…
• Shares and applies intelligence
• Works with the business, end- to- end
• Maintains flexibility and open architecture
• Enables broad contextual awareness with
dynamic control
Security to
enable
business
while also
meeting the
needs of
security
Protect information
everywhere
Effective
Work with
the business
Efficient
Firstly: Dell security and business solutions are recognized in the
Gartner Magic Quadrants 2011 to 2013
• Managed Security
Service Providers
• Unified Threat
Management
• User Administration
and Provisioning
• Identity and Access
Governance
• Enterprise Network
Firewalls
• Secure Email Gateways
• Enterprise
Backup/Recovery
Software
Challengers
Niche Players Visionaries
Leaders
Security Solutions
• Mobile Data Protection
• E- Class SRA SSL VPN
Data - Dell Data Protection | Encryption
Configuration & Patch Management
Identity - Dell One Identity
Identity & Access
Management
Network - Dell SonicWALL
Next- generation Firewall
Secure Remote Access
Email Security
Security Services- Dell SecureWork
Incident Response
Managed Security Services
Security & Risk Consulting
cloud
Data center
End points
Secondly: Dell Connected Security Solutions are comprehensive and
complete
Dell Solutions Tour
OK so that all sounds good…..
Tell me more about delivering on
your approach.
- We’ll look at the parts and I’ll show you how
the sum ends up being greater than the whole.
Dell Solutions Tour
Securing & Monitoring Data and Access
KACE
DDP|E
SonicWALL
Applications Data
SecureWorks
Connected Security: Competitive landscape
What is our unique positioning?
Security niche providers IT solution providers
They can only address part of
the problem.
You’re left with no choice
but to manage an increased
number of vendors’
solutions. This leads to a
more complex, expensive
and fragmented IT and
security environment and
presents an intolerable level
of risk.
They want to impose a large,
complex, rigid and expensive
platform on you.
They lack Dell’s breadth,
requiring integration of
multiple solutions from
multiple vendors. This means
more customization and
coding– -all at a greater
expense to you.
Dell is the only provider
that can protect the
entire IT landscape,
enabling both visibility
and security from the
inside- out, as well as
the outside- in. This
simpler, more unified
approach scales at your
pace by delivering
flexible and modular
solutions.
Limited Expensive & Inflexible
Sweet Spot:
Comprehensive & Flexible
Dell SonicWALL
Next-Generation
Firewalls
Gartner defines the unified threat
management (UTM) market as
multifunction network security products
used by small or midsize businesses
(SMBs). Typically, midsize businesses
have 100 to 1,000 employees, with
revenue ranging from $50 million to $1
billion.
Gartner recognizes
Dell as a Leader in
network security.
Download the full report for free:
http://www.sonicwall.com/us/en/14539.html
NSS Labs
Recommends
Dell as a trusted
NGFW provider.
Download the full report for free:
http://www.sonicwall.com/us/en/17360.html
Dell SonicWALL Next Generation Firewalls
SuperMassive E10800
SuperMassive E10400
SMB/Campus/Branch
Enterprise, Data Center
SuperMassive Series
TZ 215/W
TZ 205/W
TZ 105/W
SuperMassive 9600
SuperMassive 9400
SuperMassive 9200
TZ Series
NSA 4600
NSA 3600
NSA 2600
NSA 220/250M
NSA 6600
NSA 5600
NSA Series
Policy
Application intelligence, control and visualization
Identify Categorize Control
??
??
??
?
Process Visualization
Consistent Threat Protection
Secure remote access
Email security
Policy & management
Hosted
Network security
Dell SonicWALL product portfolio
Clean wireless – SonicPoint-N Series
WAN acceleration
Application
Intelligence
and Control
GAV/ Anti- Spyware
Intrusion
Prevention
Comprehensive
Anti- Spam
Service
Enforced
Client
Anti- Virus
Content
Filtering
Service
Global
VPN
Client
SSL VPN
For Network
Security
Secure
Virtual Assist
Mobile
Connect
End Point
Control
Connect
Mobile
Spike License
Pack
Advanced
Reporting
Native Access
Module
Secure
Virtual Assist
Secure
Virtual Access
Secure
Virtual Meeting
Mobile
Connect
Web Application
Firewall
Email
Protection
Email
Anti- Virus
Email
Compliance
Global
Management System
Analyzer Scrutinizer
Dell DSG
Partner
Direct
Program
38
Systems
Management
• Client management
• Performance monitoring (ETA: 11/1)
• Virtualization & cloud (ETA: 11/1)
• Windows server management
Information
Management
• Database management
• Identity & access management
• Network security
Security Data Protection
Competency Specialization Tracks
Confidential39 Global Commercial Channels
Example - Security Competency
Confidential40
Network Security
(SonicWALL)
Sales (2 Preferred/4 Premier unique individuals, ~2 hr)
• Two Required Courses:
• Security Competency Overview - SECC0913WBTS
• Dell SonicWALL Sales Training - DSW0512WBTS
Technical (2 Preferred/4 Premier unique individuals, ~2 hr)
• Two Required Courses:
• Security Competency Overview - SECC0913WBTS
• Dell SonicWALL Technical Training - DSWT0512WBTT
• Dell NSBA Lab Training
Identity and Access Management
Sales (2 Preferred/4 Premier unique individuals, ~2 hr)
• Two Required Courses:
• Security Competency Overview - SECC0913WBTS
• Identity and Access Management Sales Training -
IAM0913WBTS
Technical - (2 Preferred/4 Premier unique individuals, ~7- 8hr)
• Three Required Courses:
• Security Competency Overview - SECC0913WBTS
• Dell One Identity Manager (Quest One Identity
Manager) Technical Training - IDMA0913WBTT
• Total Privileged Access Management Value
Proposition - TPAV0913WBTT
Cross-sell Optional Network Security Curriculum:
• KACE Sales/Technical Training
• Dell Data Protection and Encryption with Credent (Sales)
Dell.com/partner
Confidential41
Log in to Partner Direct
To get a Partner Direct log in:
Certified partners: NAM email: certified_prd@dell.com
EMEA email: Channel_EMEA_Program_Office@Dell.com
Sign up with
Partner Direct
Competency descriptions
Click Competencies to view
competency descriptions
Check out the Why
Certify with Dell Blog
Training
Confidential43
Click link under a competency to
see course catalog and launch
course OR click Enroll in a course
to access NetExam training.
Click Training & Competencies
Course catalog path
Direct to NetExam path
Course catalog path to training
Confidential44
• C lick Launch to open a
course.
• C lick Enroll to begin a
course.
Direct to NetExam path to training
Confidential45
Click Training to access training
Click to access Transcript
Competency tracks
Confidential46
Select a competency track
• Every student is enrolled in ALL
available competency tracks
• The DSG competency tracks will
be on the list along with the
others
• For DSG, there will be separate
tracks for sales and technical
training
• Once a student completes all the
requirements of a competency
track, it disappears from this list
Course Completion Certificates
Confidential47
DSG
• Sales/Technical in Partner Direct
• Certification granted at the Partner
company level and tracked in CTT
(Certification Tracking Tool)
• Post- sales certification – Admin and
Implementation
• Granted at the individual level, follows
the individual
GCC
• Sales/Technical in Partner Direct
• Certification granted at the Partner
company level and tracked in CTT
• Install certification
• Granted at the individual level, follows
the individual; partner must have 1 install
certified individual to bypass the Dell
Services Sku
Secure remote access
Email security
Policy & management
Hosted
Network security
Dell SonicWALL product portfolio
Clean wireless – SonicPoint-N Series
WAN acceleration
Application
Intelligence
and Control
GAV/ Anti- Spyware
Intrusion
Prevention
Comprehensive
Anti- Spam
Service
Enforced
Client
Anti- Virus
Content
Filtering
Service
Global
VPN
Client
SSL VPN
For Network
Security
Secure
Virtual Assist
Mobile
Connect
End Point
Control
Connect
Mobile
Spike License
Pack
Advanced
Reporting
Native Access
Module
Secure
Virtual Assist
Secure
Virtual Access
Secure
Virtual Meeting
Mobile
Connect
Web Application
Firewall
Email
Protection
Email
Anti- Virus
Email
Compliance
Global
Management System
Analyzer Scrutinizer
Solutions
overview
Dell Network
Security
Solutions
49
Dell sonicwall connected security

Dell sonicwall connected security

  • 1.
    May 2013 The Powerto Do More with Dell Connected Security
  • 2.
  • 3.
    Software is anintegral part of the Dell strategy Delivering end- to- end solutions with scalable, mid- market design point Servers, Networking and Storage Services & Cloud End-User Computing Software End-to-end ITSolutions Scalable,designpoint
  • 4.
    End- user computing Services, Security, Cloud Server,storage and networking capabilities Software that leverages Dell core strengths No legacy to protect Dell Software leverages our core strengths
  • 5.
    Dell Software solutions Datacenter & cloud management • Client management • Performance management • Virtualization & cloud mgmt • Windows server mgmt • Mobile device mgmt • Desktop virtualization • Application/data access • Secure remote access Information management • Database management • Business intelligence/analytics • Application & data integration • Big data analytics Mobile workforce management • Identity & access management • Network security • Endpoint security • Email security Security Data protection • Enterprise backup/recovery • Virtual protection • Application protection • Disaster recovery
  • 6.
    New malware samples discoveredby researchers every day, according to Georgia Tech100,000 $5.5MAverage cost of a data breach in 2011, according to Ponemon Institute research Estimated cost to US businesses from data breaches in 2011, says Online Trust Alliance $6.5B 60% 7,000+ New vulnerabilities tracked in 2011 by the Counter Threat Unit New malware samples detected by Antivirus solutions, Cyveillance study shows 19%Estimated number of healthcare providers with 2 or more breaches in the last two years
  • 7.
    Trends force changesin the way you do business. A changing IT landscape = security challenges = RISK Trends Security Challenges Cloud BYOD Virtualization & new technologies Patchwork of vendor solutions => disjointed & siloed Explosive data growth $ Limited budget and expertise Time & complexity of management & reporting Insufficient visibility and counter measures Compliance Advanced persistent threats, breaches, attacks, malware
  • 8.
  • 10.
    Threats & Attacksare constantly increasing and evolving 11
  • 15.
  • 16.
    Users are IncreasinglyOut of Your Control Day Extenders Home Office Users Traveling Executives Kiosks/Public Machine Users Tablets & Smart Phone Users Wireless LAN Users VOIP Users Business Partners/ Extranet Users Internal Users External Users More…  Devices  Saas/Hosted Apps  Social Media  Network environments  Mobility Saas, Web 2.0 Real-Time Apps
  • 17.
    Why Mobile DevicesCould Be Risky? 20
  • 18.
    Were not protected withmobile security features1 57% Of lost laptops contained confidential data1 46%Average value of lost laptop1 $49,246 $5.5M IT managers are looking for ways to: + Fully protect data wherever it goes without disrupting end users + Save time deploying and managing security + Ensure they remain in compliance + Flexible scale to ensure they meet the requirements of different users Data is the most important asset companies own: + Intellectual Property + Customer and employee data + Competitive information Source: 1. Poneman Institute Study Source: 2 Symantec & Poneman Institute Study: US cost of a Data Breach, 2011 Average organizational cost of a data breach2 Every 53 Seconds a laptop is stolen Dell Solutions Tour
  • 19.
    Does Dell Havean Answer and Why Dell? - Of course because Dell’s in the problem solving business. Let’s talk about why Dell for IT security. Dell Solutions Tour Dell Solutions Tour
  • 20.
    Dell belief: there is a better way Silosand layers add stress to your resources • Difficult to get to work together • Limited security resources Individual job done well in silos • Solutions often don’t work together • Solutions don’t work across the business The problem: Today, layers and silos get the security job done but often have gaps = business risk
  • 21.
    Our POV: ConnectedSecurity for a connected world Connected Security is security that… • Shares and applies intelligence • Works with the business, end- to- end • Maintains flexibility and open architecture • Enables broad contextual awareness with dynamic control Security to enable business while also meeting the needs of security Protect information everywhere Effective Work with the business Efficient
  • 22.
    Firstly: Dell securityand business solutions are recognized in the Gartner Magic Quadrants 2011 to 2013 • Managed Security Service Providers • Unified Threat Management • User Administration and Provisioning • Identity and Access Governance • Enterprise Network Firewalls • Secure Email Gateways • Enterprise Backup/Recovery Software Challengers Niche Players Visionaries Leaders Security Solutions • Mobile Data Protection • E- Class SRA SSL VPN
  • 23.
    Data - DellData Protection | Encryption Configuration & Patch Management Identity - Dell One Identity Identity & Access Management Network - Dell SonicWALL Next- generation Firewall Secure Remote Access Email Security Security Services- Dell SecureWork Incident Response Managed Security Services Security & Risk Consulting cloud Data center End points Secondly: Dell Connected Security Solutions are comprehensive and complete Dell Solutions Tour
  • 24.
    OK so thatall sounds good….. Tell me more about delivering on your approach. - We’ll look at the parts and I’ll show you how the sum ends up being greater than the whole. Dell Solutions Tour
  • 25.
    Securing & MonitoringData and Access KACE DDP|E SonicWALL Applications Data SecureWorks
  • 26.
    Connected Security: Competitivelandscape What is our unique positioning? Security niche providers IT solution providers They can only address part of the problem. You’re left with no choice but to manage an increased number of vendors’ solutions. This leads to a more complex, expensive and fragmented IT and security environment and presents an intolerable level of risk. They want to impose a large, complex, rigid and expensive platform on you. They lack Dell’s breadth, requiring integration of multiple solutions from multiple vendors. This means more customization and coding– -all at a greater expense to you. Dell is the only provider that can protect the entire IT landscape, enabling both visibility and security from the inside- out, as well as the outside- in. This simpler, more unified approach scales at your pace by delivering flexible and modular solutions. Limited Expensive & Inflexible Sweet Spot: Comprehensive & Flexible
  • 27.
  • 28.
    Gartner defines theunified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs). Typically, midsize businesses have 100 to 1,000 employees, with revenue ranging from $50 million to $1 billion. Gartner recognizes Dell as a Leader in network security. Download the full report for free: http://www.sonicwall.com/us/en/14539.html
  • 29.
    NSS Labs Recommends Dell asa trusted NGFW provider. Download the full report for free: http://www.sonicwall.com/us/en/17360.html
  • 30.
    Dell SonicWALL NextGeneration Firewalls SuperMassive E10800 SuperMassive E10400 SMB/Campus/Branch Enterprise, Data Center SuperMassive Series TZ 215/W TZ 205/W TZ 105/W SuperMassive 9600 SuperMassive 9400 SuperMassive 9200 TZ Series NSA 4600 NSA 3600 NSA 2600 NSA 220/250M NSA 6600 NSA 5600 NSA Series
  • 31.
    Policy Application intelligence, controland visualization Identify Categorize Control ?? ?? ?? ? Process Visualization
  • 32.
  • 33.
    Secure remote access Emailsecurity Policy & management Hosted Network security Dell SonicWALL product portfolio Clean wireless – SonicPoint-N Series WAN acceleration Application Intelligence and Control GAV/ Anti- Spyware Intrusion Prevention Comprehensive Anti- Spam Service Enforced Client Anti- Virus Content Filtering Service Global VPN Client SSL VPN For Network Security Secure Virtual Assist Mobile Connect End Point Control Connect Mobile Spike License Pack Advanced Reporting Native Access Module Secure Virtual Assist Secure Virtual Access Secure Virtual Meeting Mobile Connect Web Application Firewall Email Protection Email Anti- Virus Email Compliance Global Management System Analyzer Scrutinizer
  • 34.
  • 35.
    Systems Management • Client management •Performance monitoring (ETA: 11/1) • Virtualization & cloud (ETA: 11/1) • Windows server management Information Management • Database management • Identity & access management • Network security Security Data Protection Competency Specialization Tracks Confidential39 Global Commercial Channels
  • 36.
    Example - SecurityCompetency Confidential40 Network Security (SonicWALL) Sales (2 Preferred/4 Premier unique individuals, ~2 hr) • Two Required Courses: • Security Competency Overview - SECC0913WBTS • Dell SonicWALL Sales Training - DSW0512WBTS Technical (2 Preferred/4 Premier unique individuals, ~2 hr) • Two Required Courses: • Security Competency Overview - SECC0913WBTS • Dell SonicWALL Technical Training - DSWT0512WBTT • Dell NSBA Lab Training Identity and Access Management Sales (2 Preferred/4 Premier unique individuals, ~2 hr) • Two Required Courses: • Security Competency Overview - SECC0913WBTS • Identity and Access Management Sales Training - IAM0913WBTS Technical - (2 Preferred/4 Premier unique individuals, ~7- 8hr) • Three Required Courses: • Security Competency Overview - SECC0913WBTS • Dell One Identity Manager (Quest One Identity Manager) Technical Training - IDMA0913WBTT • Total Privileged Access Management Value Proposition - TPAV0913WBTT Cross-sell Optional Network Security Curriculum: • KACE Sales/Technical Training • Dell Data Protection and Encryption with Credent (Sales)
  • 37.
    Dell.com/partner Confidential41 Log in toPartner Direct To get a Partner Direct log in: Certified partners: NAM email: certified_prd@dell.com EMEA email: Channel_EMEA_Program_Office@Dell.com Sign up with Partner Direct
  • 38.
    Competency descriptions Click Competenciesto view competency descriptions Check out the Why Certify with Dell Blog
  • 39.
    Training Confidential43 Click link undera competency to see course catalog and launch course OR click Enroll in a course to access NetExam training. Click Training & Competencies Course catalog path Direct to NetExam path
  • 40.
    Course catalog pathto training Confidential44 • C lick Launch to open a course. • C lick Enroll to begin a course.
  • 41.
    Direct to NetExampath to training Confidential45 Click Training to access training Click to access Transcript
  • 42.
    Competency tracks Confidential46 Select acompetency track • Every student is enrolled in ALL available competency tracks • The DSG competency tracks will be on the list along with the others • For DSG, there will be separate tracks for sales and technical training • Once a student completes all the requirements of a competency track, it disappears from this list
  • 43.
    Course Completion Certificates Confidential47 DSG •Sales/Technical in Partner Direct • Certification granted at the Partner company level and tracked in CTT (Certification Tracking Tool) • Post- sales certification – Admin and Implementation • Granted at the individual level, follows the individual GCC • Sales/Technical in Partner Direct • Certification granted at the Partner company level and tracked in CTT • Install certification • Granted at the individual level, follows the individual; partner must have 1 install certified individual to bypass the Dell Services Sku
  • 44.
    Secure remote access Emailsecurity Policy & management Hosted Network security Dell SonicWALL product portfolio Clean wireless – SonicPoint-N Series WAN acceleration Application Intelligence and Control GAV/ Anti- Spyware Intrusion Prevention Comprehensive Anti- Spam Service Enforced Client Anti- Virus Content Filtering Service Global VPN Client SSL VPN For Network Security Secure Virtual Assist Mobile Connect End Point Control Connect Mobile Spike License Pack Advanced Reporting Native Access Module Secure Virtual Assist Secure Virtual Access Secure Virtual Meeting Mobile Connect Web Application Firewall Email Protection Email Anti- Virus Email Compliance Global Management System Analyzer Scrutinizer
  • 45.