SlideShare a Scribd company logo
Welcome! Delldirekte.no/DellST14
Dell Solutions Tour 2014 
We welcome you together with our partners!
Dell Solutions Tour 2014
Dell Solutions Tour 2014
Dell Solutions Tour 2014 
Connect with us 
@DellLytter @DellDirekte 
http://www.linkedin.com/company/dell 
https://www.facebook.com/DellNorway 
DellDirekte.no 
#DellST14 
Delldirekte/DellST14
Dell Solutions Tour 2014
The Dell Advantage 
Florian Malecki 
International Product Marketing Director – Dell Security
The Dell Advantage 
Presenter name 
Presenter title 
Date 
What if….
Making technology more accessible Giving organizations of any size the power to do more
Dell Solutions Tour 2014 
Practical innovation Our Research & Development strategy 
• 
Best-of-breed platforms 
• 
Organic innovation 
• 
Integration across all elements 
Build 
• 
Joint product and solution engineering and testing 
• 
Common strategic roadmaps 
Partner 
• 
$18 billion and 20 acquisitions 
• 
Full adherence to the Dell design philosophy 
Acquire
The intersection 
of traditional and new IT
Ready for tomorrow 
Optimized for today
Dell Solutions Tour 2014 
Standards-based 
No deliberate proprietary lock in 
Dell is different Reach your full potential without limitations 
Modern platforms 
No vested interest in legacy systems 
End-to-end solutions 
No siloed viewpoint or hidden agenda 
Flexible scaling 
No forced constraints or rip-and-replace 
Modular systems 
No costly monolithic stacks 
Open approach 
No intentionally closed ecosystems
Dell Solutions Tour 2014 
Leadership that benefits every customer Making powerful technology more accessible and affordable 
Search 
4 of 5 top search engines worldwide powered by Dell 
Data center 
#1 provider of virtualized data center infrastructure 
Social 
3 of 4 
top social media websites are powered by Dell 
Cloud 
#1 provider of cloud infrastructure— over 1M servers shipped 
Software 
90% of Fortune 1000 companies use Dell software 
Servers 
#1 server provider in North America, Latin America, China 
Storage 
#1 
provider of iSCSI storage solutions 
Support 
#1 in enterprise services support
Let’s continue the conversation 
Your challenges 
drive our 
capabilities
Optimized enterprise Business-class connected solutions Flexible, next-gen services Value-added software 
One place for end-to-end solutions
Dell Security Better security, better business
Dell - Restricted - Confidential 
Underlying foundation of threats: Basic nature of threats is constant change 
• 
Individual computers 
• 
Modem 
• 
Security 
• 
Firewall 101 
• 
TSRs 
• 
Viruses 
• 
Internet 
• 
Worms 
• 
Trojans 
• 
DOS/ DDOS 
• 
Physical again (Portable media) 
1980 
1990 
2000 
2014 
Global infrastructure 
Individual computers 
Individual networks 
Multiple networks 
Regional networks 
• 
Financial gain 
• 
Espionage - intel gathering 
• 
Nefarious purpose 
• 
Competitive advantage 
• 
Homeland security threats 
• 
Advance Persistent Threat 
• 
Morphing and complex threats 
• 
AI (learn) hacking 
• 
XSS, SQL Injection attacks 
• 
Delivery via Web 2.0 and social networking sites 
• 
Gov’t Healthcare Spam / Phishing 
• 
Watering-hole attacks 
• 
Ransomware 
• 
System hopping malware 
• 
Sophisticated Smartphone Attacks
Dell - Restricted - Confidential 
Recent attack examples
Dell - Restricted - Confidential 
Cyber-criminal ecosystem 
• 
Increase in criminal-to-criminal activity 
1. 
Exploit auction houses (WabiSabiLabi) 
2. 
Forums and IRC (#Vxers, cybermafia.cc) 
3. 
Distribution service (IFRAMES.BIZ) 
4. 
Botnet rental (5Socks.net) 
5. 
Licensing model (storm worm) 
6. 
Identity auctions (76service) 
7. 
Social networks (ranking and escrow) 
Fourth generation 
Source: Dell SecureWorks
Dell - Restricted - Confidential 
#1 
74x > 
What if Hackers Inc. was a company? 
Source: Dell SecureWorks
The connected world creates massive opportunity. And IT needs to be the enabler. 
Enter new markets 
Drive efficiency 
Create new products 
Use new technologies
Dell - Restricted - Confidential 
Third Platform Technologies are here 
Cloud 
Social 
Mobility 
Big Data
Dell - Restricted - Confidential 
But can introduce known threats... 
• 
Mobile computing has the challenges of malware and phishing 
• 
Cloud computing has the challenges of access and identity, hacking and virtual appliances. 
• 
Social networking has the challenges of privacy and identity theft 
• 
Big data brings the challenges of hacking, ransomware and intrusions leading to mass identity theft.
Dell - Restricted - Confidential 
For example, the integration of social networking and the cloud will result in social network credentials being used as an element in identity and access management. We are already seeing this trend emerging on the internet, as Twitter and Facebook credentials are used for identification on other platforms. If used as an access and identity element on sites that require high security, this could introduce significant security challenges as the same social credentials are exposed in less secure environments. 
and connected threats…
27 
Dell - Restricted - Confidential 
Risky 
Security silos create risk that impedes business innovation 
Complexity 
Threats 
Compliance 
Lack of Resources 
Web 2.0 
Virtualization 
Cloud 
Mobility 
Big Data 
Challenges 
Opportunities 
Expensive 
Inefficient
Dell - Restricted - Confidential 
Dell delivers a better way, with security that works together across your whole business. 
Holistic 
Proactive 
Transparent
29 
Dell - Restricted - Confidential 
The Dell Security difference 
Connected 
end-to-end 
Shared, context- aware intelligence 
Built for humans 
Makes it easy for people to do the right thing Stands in the way of threats, not people and productivity 
Enables proactive protection everywhere Share real-time threat information system-wide 
Closes gaps, reduces complexity and mitigates risk 
Secure your business from device to datacenter to cloud
Dell - Restricted - Confidential 
The result: better security, better business 
Enable 
the enterprise to embrace new technologies faster than the competition 
Comply with regulations and achieve consistent, reliable governance 
Protect the whole enterprise – outside in and inside out – efficiently and proactively
Dell - Restricted - Confidential 
Delivering best-in-class security solutions 
Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov 
Security Services 
Incident Response 
Managed Security Svcs 
Security & Risk Consult 
Threat Intelligence 
Data/Endpoint Encryption Protected Workspace Configuration & Patch Management Secure Cloud Client 
Network 
Next Gen Firewall 
Secure Mobile Access 
Email Security
Dell - Restricted - Confidential 
SonicWALL 
SecureWorks 
Dell One Identity Solutions 
Applications 
Data 
DDP|E 
Kace 
Enterprise 
BitLocker Manager
Dell - Restricted - Confidential 
Let good guys in 
Keep bad guys out 
Dell Security Services 
Embedded in Dell Infrastructure & Devices 
Scalable and Mid-Market design point: endpoint to data center to cloud 
Application Security 
Network Security 
Data & Endpoint Security 
Dell SonicWALL Email Security 
Dell KACE 
Configuration & Patch Management 
Dell SonicWALL Next-Gen Firewall 
Dell Data Protection Encryption 
Dell SonicWALL 
Mobile Connect 
Dell KACE K3000 MDM 
Endpoint 
Network 
Server 
Storage 
Cloud 
Dell Managed Security Services 
Dell Security & Risk Consulting 
Dell Threat Intelligence 
Dell Incident Response 
Dell Wyse Cloud Client Manager 
Dell One Identity IAM 
Did you know Dell does Security? 
Enstratius (Multi-Cloud Manager) IAM 
Dell SonicWALL 
Secure Remote Access (SRA) 
*formerly Quest One
Dell - Restricted - Confidential 
Use case: data security in the cloud 
Market trend 
Dell Next-Generation Firewalls + Dell Data Protection (Cloud Edition) = Network-enforced encryption 
Customer challenges 
• 
Ensure data is encrypted using authorized keys before it leaves the network to be stored or shared in cloud 
• 
Ensure sharing or opening of content is not done by unauthorized users 
• 
Centralize network policy enforcement/ controls 
• 
Report on authorized and unauthorized files being uploaded to cloud 
• 
Growing usage of public cloud storage – users need to share potentially sensitive data 
• 
Compliance requirements demand that data is encrypted before being sent and stored in the cloud 
• 
Lack of enforcement options to protect the organization and the user
Dell - Restricted - Confidential 
Security leadership, scale and recognition 
Validated by the industry 
• 
#1 ranked company in Security 500 
• 
“Recommended” by NSS Labs for Firewall & IPS – 3 years in row 
• 
Overall Leader in Access Governance, Kuppinger Cole 
• 
Best Security Service, Cloud Security, Compliance, Info Security Products Guide 
• 
Recommended by SC Magazine 
• 
Major Player, Email Security, IDC 
• 
6 Gartner Magic Quadrants 
60B+ security events analyzed daily 
2M devices WW reporting on 40m users 
Detects 3B security events of interest daily 
Dell SecureWorks 
$14 Trillion in assets protected daily 
15,000 malicious events analyzed daily 
3,000 security incidents escalated daily 
Over 18 Trillion applications controlled 
Dell SonicWALL 
Dell Data Protection Encryption 
Data encrypted & protected on 7M devices 
Dell Identity and Access Management 
110M managed identities 
2,000+ security professionals worldwide
Securing Dell with Dell – Leveraging our Strengths 
• 
Managed Security Services offering – All Dell firewalls & IPS 
• 
Monthly average of 22 billion events – 148 escalations back to Dell IT Security team for investigation (top 10% of SecureWorks customer base) 
• 
Deployed Secure Mobile Access solution to replace incumbent 
• 
Started joint development with firewall business unit 
KACE K1000 Management Appliance deployed in Dell’s highly secure, segmented PKI environment for full patch management 
Deploying on Dell internal notebooks 
• 
Authentication Services & Recovery Manager 
• 
Account provisioning through Dell One Identity Manager 
Dell on Dell example
Connected Security: Competitive landscape 
What is our unique positioning? 
Security niche providers 
IT solution providers 
They can only address part of the problem. You’re left with no choice but to manage an increased number of vendors’ solutions. This leads to a more complex, expensive and fragmented IT and security environment and presents an intolerable level of risk. 
They want to impose a large, complex, rigid and expensive platform on you. 
They lack Dell’s breadth, requiring integration of multiple solutions from multiple vendors. This means more customization and coding–-all at a greater expense to you. 
Dell is the only provider that can protect the entire IT landscape, enabling both visibility and security from the inside-out, as well as the outside-in. This simpler, more unified approach scales at your pace by delivering flexible and modular solutions. 
Limited 
Expensive & Inflexible 
Sweet Spot: 
Comprehensive & Flexible

More Related Content

What's hot

HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
Mark Interrante
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Switzerland
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Dell World
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
NetIQ
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
finance40
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
Dell World
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
Dell EMC World
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
MT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysMT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge Gateways
Dell EMC World
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
InnoTech
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
Information Security Awareness Group
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
Jody Keyser
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
Giuseppe Paterno'
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
solarisyourep
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
Wolfgang Kandek
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
CipherCloud
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
Citrix
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
Citrix
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
Intellicomp GmbH
 

What's hot (20)

HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
Securely managing all Dell and non-Dell end user devices: Endpoint systems ma...
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Symantec 2006_Annual_Report
Symantec  2006_Annual_ReportSymantec  2006_Annual_Report
Symantec 2006_Annual_Report
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
MT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysMT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge Gateways
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Cloud is not an option, but is security?
Cloud is not an option, but is security?Cloud is not an option, but is security?
Cloud is not an option, but is security?
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013SANS Critical Security Controls Summit London 2013
SANS Critical Security Controls Summit London 2013
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI3 Ways Companies Are Slashing IT Costs with VDI
3 Ways Companies Are Slashing IT Costs with VDI
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 

Viewers also liked

Dell Ppt
Dell PptDell Ppt
Dell Ppt
biju777
 
Case study of Competitive advantage at Dell Inc
Case study of  Competitive advantage at Dell IncCase study of  Competitive advantage at Dell Inc
Case study of Competitive advantage at Dell Inc
Mehvish Rehman
 
Sp2 05.21.12 efficiency and effectiveness presentation
Sp2 05.21.12 efficiency and effectiveness presentationSp2 05.21.12 efficiency and effectiveness presentation
Sp2 05.21.12 efficiency and effectiveness presentation
cityofevanston
 
Assignment on effectiveness vs efficiency
Assignment on effectiveness vs efficiencyAssignment on effectiveness vs efficiency
Assignment on effectiveness vs efficiency
Arafat Yeasin
 
Organisational Productivity
Organisational ProductivityOrganisational Productivity
Organisational Productivity
David Alman
 
DELL supply chain management
DELL supply chain management DELL supply chain management
DELL supply chain management
Ashwarya Chaudhary
 
Productivity: The Key to Organizational Success
Productivity: The Key to Organizational SuccessProductivity: The Key to Organizational Success
Productivity: The Key to Organizational Success
Muhammad Bilal
 
Effectiveness and Efficiency
Effectiveness and EfficiencyEffectiveness and Efficiency
Effectiveness and Efficiency
Booz Allen Hamilton
 
Dell Strategic Management Final Paper
Dell Strategic Management Final Paper Dell Strategic Management Final Paper
Dell Strategic Management Final Paper
Sophie Yanez
 
Dell - Strategy Analysis
Dell - Strategy AnalysisDell - Strategy Analysis
Dell - Strategy Analysis
Rory Tan
 
Efficiency versus Effectiveness
Efficiency versus EffectivenessEfficiency versus Effectiveness
Efficiency versus Effectiveness
Purva Verma
 
what is Productivity
what is  Productivitywhat is  Productivity
what is Productivity
Vishal Kachhdiya
 
1. productivity concept and calculation.
1. productivity concept and calculation.1. productivity concept and calculation.
1. productivity concept and calculation.
Samir Potale-sylvester
 
Comparative analysis of hp and dell
Comparative analysis of hp and dellComparative analysis of hp and dell
Comparative analysis of hp and dell
Mani Afzal
 
Improving Productivity
Improving ProductivityImproving Productivity
Improving Productivity
ScottMadden, Inc.
 
Factors affecting productivity
Factors affecting productivity Factors affecting productivity
Factors affecting productivity
Waleed Attalla
 
22 ways to improve productivity in the workplace
22 ways to improve productivity in the workplace22 ways to improve productivity in the workplace
22 ways to improve productivity in the workplace
Clear Books plc
 
different techniques to productivity improvement
different techniques to productivity improvementdifferent techniques to productivity improvement
different techniques to productivity improvement
Hemant Patil
 
Productivity, Productivity, Productivity
Productivity, Productivity, ProductivityProductivity, Productivity, Productivity
Productivity, Productivity, Productivity
Fabian Alcantara
 
Productivity
ProductivityProductivity
Productivity
J.T.A.JONES
 

Viewers also liked (20)

Dell Ppt
Dell PptDell Ppt
Dell Ppt
 
Case study of Competitive advantage at Dell Inc
Case study of  Competitive advantage at Dell IncCase study of  Competitive advantage at Dell Inc
Case study of Competitive advantage at Dell Inc
 
Sp2 05.21.12 efficiency and effectiveness presentation
Sp2 05.21.12 efficiency and effectiveness presentationSp2 05.21.12 efficiency and effectiveness presentation
Sp2 05.21.12 efficiency and effectiveness presentation
 
Assignment on effectiveness vs efficiency
Assignment on effectiveness vs efficiencyAssignment on effectiveness vs efficiency
Assignment on effectiveness vs efficiency
 
Organisational Productivity
Organisational ProductivityOrganisational Productivity
Organisational Productivity
 
DELL supply chain management
DELL supply chain management DELL supply chain management
DELL supply chain management
 
Productivity: The Key to Organizational Success
Productivity: The Key to Organizational SuccessProductivity: The Key to Organizational Success
Productivity: The Key to Organizational Success
 
Effectiveness and Efficiency
Effectiveness and EfficiencyEffectiveness and Efficiency
Effectiveness and Efficiency
 
Dell Strategic Management Final Paper
Dell Strategic Management Final Paper Dell Strategic Management Final Paper
Dell Strategic Management Final Paper
 
Dell - Strategy Analysis
Dell - Strategy AnalysisDell - Strategy Analysis
Dell - Strategy Analysis
 
Efficiency versus Effectiveness
Efficiency versus EffectivenessEfficiency versus Effectiveness
Efficiency versus Effectiveness
 
what is Productivity
what is  Productivitywhat is  Productivity
what is Productivity
 
1. productivity concept and calculation.
1. productivity concept and calculation.1. productivity concept and calculation.
1. productivity concept and calculation.
 
Comparative analysis of hp and dell
Comparative analysis of hp and dellComparative analysis of hp and dell
Comparative analysis of hp and dell
 
Improving Productivity
Improving ProductivityImproving Productivity
Improving Productivity
 
Factors affecting productivity
Factors affecting productivity Factors affecting productivity
Factors affecting productivity
 
22 ways to improve productivity in the workplace
22 ways to improve productivity in the workplace22 ways to improve productivity in the workplace
22 ways to improve productivity in the workplace
 
different techniques to productivity improvement
different techniques to productivity improvementdifferent techniques to productivity improvement
different techniques to productivity improvement
 
Productivity, Productivity, Productivity
Productivity, Productivity, ProductivityProductivity, Productivity, Productivity
Productivity, Productivity, Productivity
 
Productivity
ProductivityProductivity
Productivity
 

Similar to Efficiency, effectiveness, productivity: Dell Connected Security in action

Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
Motty Ben Atia
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
Dell EMC World
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
Dell World
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
Microsoft Ideas
 
Dell EMC Advantage
Dell EMC AdvantageDell EMC Advantage
Dell EMC Advantage
gpadmanabh
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
Priyanka Aash
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
Marco Casassa Mont
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
Dell EMC World
 
How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”
Kenneth de Brucq
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
Dell EMC World
 
Claire Vyvyan, Embracing the Hybrid Cloud
Claire Vyvyan, Embracing the Hybrid CloudClaire Vyvyan, Embracing the Hybrid Cloud
Claire Vyvyan, Embracing the Hybrid Cloud
Juergen Domnik
 
The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...
Dell World
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel Partners
Dell World
 
Dell mobilitetslosninger - mer effektiv hverdag!
Dell mobilitetslosninger - mer effektiv hverdag!Dell mobilitetslosninger - mer effektiv hverdag!
Dell mobilitetslosninger - mer effektiv hverdag!
Kenneth de Brucq
 
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
Dell EMC World
 
Build Your Business On Dell Technology: Dell OEM Solutions
Build Your Business On Dell Technology: Dell OEM SolutionsBuild Your Business On Dell Technology: Dell OEM Solutions
Build Your Business On Dell Technology: Dell OEM Solutions
Dell World
 
The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security First
Dell World
 
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup AppliancesHow to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
DLT Solutions
 
Professional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptxProfessional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptx
ssusercc05cf
 

Similar to Efficiency, effectiveness, productivity: Dell Connected Security in action (20)

Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
La sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SILa sécurité de l'emploi : protégez votre SI
La sécurité de l'emploi : protégez votre SI
 
Dell EMC Advantage
Dell EMC AdvantageDell EMC Advantage
Dell EMC Advantage
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”How to Build OpenStack Clouds and how to manage and control “shadow IT”
How to Build OpenStack Clouds and how to manage and control “shadow IT”
 
MT54 Better security is better business
MT54 Better security is better businessMT54 Better security is better business
MT54 Better security is better business
 
Claire Vyvyan, Embracing the Hybrid Cloud
Claire Vyvyan, Embracing the Hybrid CloudClaire Vyvyan, Embracing the Hybrid Cloud
Claire Vyvyan, Embracing the Hybrid Cloud
 
The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...The Business Computing Imperative: Delivering End User Productivity and IT Co...
The Business Computing Imperative: Delivering End User Productivity and IT Co...
 
Dell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel PartnersDell Software: An Opportunity For Channel Partners
Dell Software: An Opportunity For Channel Partners
 
Dell mobilitetslosninger - mer effektiv hverdag!
Dell mobilitetslosninger - mer effektiv hverdag!Dell mobilitetslosninger - mer effektiv hverdag!
Dell mobilitetslosninger - mer effektiv hverdag!
 
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
MT44 Dell EMC Data Protection: What You Need to Know About Data Protection Ev...
 
Build Your Business On Dell Technology: Dell OEM Solutions
Build Your Business On Dell Technology: Dell OEM SolutionsBuild Your Business On Dell Technology: Dell OEM Solutions
Build Your Business On Dell Technology: Dell OEM Solutions
 
The Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security FirstThe Enterprise Internet of Things: Think Security First
The Enterprise Internet of Things: Think Security First
 
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup AppliancesHow to Accelerate Backup Performance with Dell DR Series Backup Appliances
How to Accelerate Backup Performance with Dell DR Series Backup Appliances
 
Professional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptxProfessional Services for Cyber Recovery .pptx
Professional Services for Cyber Recovery .pptx
 

More from Kenneth de Brucq

Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
Kenneth de Brucq
 
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
Kenneth de Brucq
 
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready ITDell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Kenneth de Brucq
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Kenneth de Brucq
 
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
Kenneth de Brucq
 
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
Kenneth de Brucq
 
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
Kenneth de Brucq
 
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Kenneth de Brucq
 
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Kenneth de Brucq
 
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
Kenneth de Brucq
 
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
Kenneth de Brucq
 
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
Kenneth de Brucq
 
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Kenneth de Brucq
 
VMware EVO - Fremtidens datarom er hyperkonvergert
VMware EVO - Fremtidens datarom er hyperkonvergertVMware EVO - Fremtidens datarom er hyperkonvergert
VMware EVO - Fremtidens datarom er hyperkonvergert
Kenneth de Brucq
 
Virtualization performance management
Virtualization performance managementVirtualization performance management
Virtualization performance management
Kenneth de Brucq
 
Optimalisert datasenter
Optimalisert datasenterOptimalisert datasenter
Optimalisert datasenter
Kenneth de Brucq
 
Modernize & transform your network
Modernize & transform your network Modernize & transform your network
Modernize & transform your network
Kenneth de Brucq
 
Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!
Kenneth de Brucq
 
Dell SSD og Flash teknologi i SAN
Dell SSD og Flash teknologi i SANDell SSD og Flash teknologi i SAN
Dell SSD og Flash teknologi i SAN
Kenneth de Brucq
 
Hybrid datasenter - fremtidsrettet og optimalisert med Microsoft Cloud OS
Hybrid datasenter - fremtidsrettet og optimalisert med Microsoft Cloud OSHybrid datasenter - fremtidsrettet og optimalisert med Microsoft Cloud OS
Hybrid datasenter - fremtidsrettet og optimalisert med Microsoft Cloud OS
Kenneth de Brucq
 

More from Kenneth de Brucq (20)

Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
Dell Solutions Tour 2015- Workplace Transformation - Harnessing cultural chan...
 
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
Dell Solutions Tour 2015 - Programvare erstatter maskinvare, revolusjonen har...
 
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready ITDell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
Dell Solutions Tour 2015 - Velkommen og Key Note: Future Ready IT
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
Dell Solutions Tour 2015 - Dell Blueprints – referansearkitekturer eller nøkk...
 
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
Dell Solutions Tour 2015 - Harness the power of the cloud with Dell Cloud Cli...
 
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
Dell Solutions Tour 2015 - Neste generasjons Windows Server og System Center,...
 
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
Dell Solutions Tour 2015 - Chromebook - Dell og Google viser vei, Ross Mahon ...
 
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
Dell Solutions Tour 2015 - Hvordan bygger man et optimalt grønt datasenter i ...
 
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
Dell Solutions Tour 2015- Dells Storage-strategi - Et hav av muligheter, Clae...
 
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
Dell Solutions Tour 2015- Client Solutions: Built for business, Lasse Kåsa, P...
 
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
Dell Solutions Tour 2015 - Azure i ditt eget datasenter, Kristian Nese, CTO L...
 
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
Dell Solutions Tour 2015- Open Stack Cloud: How UH-SKY have approached gettin...
 
VMware EVO - Fremtidens datarom er hyperkonvergert
VMware EVO - Fremtidens datarom er hyperkonvergertVMware EVO - Fremtidens datarom er hyperkonvergert
VMware EVO - Fremtidens datarom er hyperkonvergert
 
Virtualization performance management
Virtualization performance managementVirtualization performance management
Virtualization performance management
 
Optimalisert datasenter
Optimalisert datasenterOptimalisert datasenter
Optimalisert datasenter
 
Modernize & transform your network
Modernize & transform your network Modernize & transform your network
Modernize & transform your network
 
Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!Dell Wyse Datacenter for vWorkspace!
Dell Wyse Datacenter for vWorkspace!
 
Dell SSD og Flash teknologi i SAN
Dell SSD og Flash teknologi i SANDell SSD og Flash teknologi i SAN
Dell SSD og Flash teknologi i SAN
 
Hybrid datasenter - fremtidsrettet og optimalisert med Microsoft Cloud OS
Hybrid datasenter - fremtidsrettet og optimalisert med Microsoft Cloud OSHybrid datasenter - fremtidsrettet og optimalisert med Microsoft Cloud OS
Hybrid datasenter - fremtidsrettet og optimalisert med Microsoft Cloud OS
 

Efficiency, effectiveness, productivity: Dell Connected Security in action

  • 2. Dell Solutions Tour 2014 We welcome you together with our partners!
  • 5. Dell Solutions Tour 2014 Connect with us @DellLytter @DellDirekte http://www.linkedin.com/company/dell https://www.facebook.com/DellNorway DellDirekte.no #DellST14 Delldirekte/DellST14
  • 7. The Dell Advantage Florian Malecki International Product Marketing Director – Dell Security
  • 8. The Dell Advantage Presenter name Presenter title Date What if….
  • 9. Making technology more accessible Giving organizations of any size the power to do more
  • 10. Dell Solutions Tour 2014 Practical innovation Our Research & Development strategy • Best-of-breed platforms • Organic innovation • Integration across all elements Build • Joint product and solution engineering and testing • Common strategic roadmaps Partner • $18 billion and 20 acquisitions • Full adherence to the Dell design philosophy Acquire
  • 11. The intersection of traditional and new IT
  • 12. Ready for tomorrow Optimized for today
  • 13. Dell Solutions Tour 2014 Standards-based No deliberate proprietary lock in Dell is different Reach your full potential without limitations Modern platforms No vested interest in legacy systems End-to-end solutions No siloed viewpoint or hidden agenda Flexible scaling No forced constraints or rip-and-replace Modular systems No costly monolithic stacks Open approach No intentionally closed ecosystems
  • 14. Dell Solutions Tour 2014 Leadership that benefits every customer Making powerful technology more accessible and affordable Search 4 of 5 top search engines worldwide powered by Dell Data center #1 provider of virtualized data center infrastructure Social 3 of 4 top social media websites are powered by Dell Cloud #1 provider of cloud infrastructure— over 1M servers shipped Software 90% of Fortune 1000 companies use Dell software Servers #1 server provider in North America, Latin America, China Storage #1 provider of iSCSI storage solutions Support #1 in enterprise services support
  • 15. Let’s continue the conversation Your challenges drive our capabilities
  • 16. Optimized enterprise Business-class connected solutions Flexible, next-gen services Value-added software One place for end-to-end solutions
  • 17. Dell Security Better security, better business
  • 18. Dell - Restricted - Confidential Underlying foundation of threats: Basic nature of threats is constant change • Individual computers • Modem • Security • Firewall 101 • TSRs • Viruses • Internet • Worms • Trojans • DOS/ DDOS • Physical again (Portable media) 1980 1990 2000 2014 Global infrastructure Individual computers Individual networks Multiple networks Regional networks • Financial gain • Espionage - intel gathering • Nefarious purpose • Competitive advantage • Homeland security threats • Advance Persistent Threat • Morphing and complex threats • AI (learn) hacking • XSS, SQL Injection attacks • Delivery via Web 2.0 and social networking sites • Gov’t Healthcare Spam / Phishing • Watering-hole attacks • Ransomware • System hopping malware • Sophisticated Smartphone Attacks
  • 19. Dell - Restricted - Confidential Recent attack examples
  • 20. Dell - Restricted - Confidential Cyber-criminal ecosystem • Increase in criminal-to-criminal activity 1. Exploit auction houses (WabiSabiLabi) 2. Forums and IRC (#Vxers, cybermafia.cc) 3. Distribution service (IFRAMES.BIZ) 4. Botnet rental (5Socks.net) 5. Licensing model (storm worm) 6. Identity auctions (76service) 7. Social networks (ranking and escrow) Fourth generation Source: Dell SecureWorks
  • 21. Dell - Restricted - Confidential #1 74x > What if Hackers Inc. was a company? Source: Dell SecureWorks
  • 22. The connected world creates massive opportunity. And IT needs to be the enabler. Enter new markets Drive efficiency Create new products Use new technologies
  • 23. Dell - Restricted - Confidential Third Platform Technologies are here Cloud Social Mobility Big Data
  • 24. Dell - Restricted - Confidential But can introduce known threats... • Mobile computing has the challenges of malware and phishing • Cloud computing has the challenges of access and identity, hacking and virtual appliances. • Social networking has the challenges of privacy and identity theft • Big data brings the challenges of hacking, ransomware and intrusions leading to mass identity theft.
  • 25. Dell - Restricted - Confidential For example, the integration of social networking and the cloud will result in social network credentials being used as an element in identity and access management. We are already seeing this trend emerging on the internet, as Twitter and Facebook credentials are used for identification on other platforms. If used as an access and identity element on sites that require high security, this could introduce significant security challenges as the same social credentials are exposed in less secure environments. and connected threats…
  • 26. 27 Dell - Restricted - Confidential Risky Security silos create risk that impedes business innovation Complexity Threats Compliance Lack of Resources Web 2.0 Virtualization Cloud Mobility Big Data Challenges Opportunities Expensive Inefficient
  • 27. Dell - Restricted - Confidential Dell delivers a better way, with security that works together across your whole business. Holistic Proactive Transparent
  • 28. 29 Dell - Restricted - Confidential The Dell Security difference Connected end-to-end Shared, context- aware intelligence Built for humans Makes it easy for people to do the right thing Stands in the way of threats, not people and productivity Enables proactive protection everywhere Share real-time threat information system-wide Closes gaps, reduces complexity and mitigates risk Secure your business from device to datacenter to cloud
  • 29. Dell - Restricted - Confidential The result: better security, better business Enable the enterprise to embrace new technologies faster than the competition Comply with regulations and achieve consistent, reliable governance Protect the whole enterprise – outside in and inside out – efficiently and proactively
  • 30. Dell - Restricted - Confidential Delivering best-in-class security solutions Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov Security Services Incident Response Managed Security Svcs Security & Risk Consult Threat Intelligence Data/Endpoint Encryption Protected Workspace Configuration & Patch Management Secure Cloud Client Network Next Gen Firewall Secure Mobile Access Email Security
  • 31. Dell - Restricted - Confidential SonicWALL SecureWorks Dell One Identity Solutions Applications Data DDP|E Kace Enterprise BitLocker Manager
  • 32. Dell - Restricted - Confidential Let good guys in Keep bad guys out Dell Security Services Embedded in Dell Infrastructure & Devices Scalable and Mid-Market design point: endpoint to data center to cloud Application Security Network Security Data & Endpoint Security Dell SonicWALL Email Security Dell KACE Configuration & Patch Management Dell SonicWALL Next-Gen Firewall Dell Data Protection Encryption Dell SonicWALL Mobile Connect Dell KACE K3000 MDM Endpoint Network Server Storage Cloud Dell Managed Security Services Dell Security & Risk Consulting Dell Threat Intelligence Dell Incident Response Dell Wyse Cloud Client Manager Dell One Identity IAM Did you know Dell does Security? Enstratius (Multi-Cloud Manager) IAM Dell SonicWALL Secure Remote Access (SRA) *formerly Quest One
  • 33. Dell - Restricted - Confidential Use case: data security in the cloud Market trend Dell Next-Generation Firewalls + Dell Data Protection (Cloud Edition) = Network-enforced encryption Customer challenges • Ensure data is encrypted using authorized keys before it leaves the network to be stored or shared in cloud • Ensure sharing or opening of content is not done by unauthorized users • Centralize network policy enforcement/ controls • Report on authorized and unauthorized files being uploaded to cloud • Growing usage of public cloud storage – users need to share potentially sensitive data • Compliance requirements demand that data is encrypted before being sent and stored in the cloud • Lack of enforcement options to protect the organization and the user
  • 34. Dell - Restricted - Confidential Security leadership, scale and recognition Validated by the industry • #1 ranked company in Security 500 • “Recommended” by NSS Labs for Firewall & IPS – 3 years in row • Overall Leader in Access Governance, Kuppinger Cole • Best Security Service, Cloud Security, Compliance, Info Security Products Guide • Recommended by SC Magazine • Major Player, Email Security, IDC • 6 Gartner Magic Quadrants 60B+ security events analyzed daily 2M devices WW reporting on 40m users Detects 3B security events of interest daily Dell SecureWorks $14 Trillion in assets protected daily 15,000 malicious events analyzed daily 3,000 security incidents escalated daily Over 18 Trillion applications controlled Dell SonicWALL Dell Data Protection Encryption Data encrypted & protected on 7M devices Dell Identity and Access Management 110M managed identities 2,000+ security professionals worldwide
  • 35. Securing Dell with Dell – Leveraging our Strengths • Managed Security Services offering – All Dell firewalls & IPS • Monthly average of 22 billion events – 148 escalations back to Dell IT Security team for investigation (top 10% of SecureWorks customer base) • Deployed Secure Mobile Access solution to replace incumbent • Started joint development with firewall business unit KACE K1000 Management Appliance deployed in Dell’s highly secure, segmented PKI environment for full patch management Deploying on Dell internal notebooks • Authentication Services & Recovery Manager • Account provisioning through Dell One Identity Manager Dell on Dell example
  • 36. Connected Security: Competitive landscape What is our unique positioning? Security niche providers IT solution providers They can only address part of the problem. You’re left with no choice but to manage an increased number of vendors’ solutions. This leads to a more complex, expensive and fragmented IT and security environment and presents an intolerable level of risk. They want to impose a large, complex, rigid and expensive platform on you. They lack Dell’s breadth, requiring integration of multiple solutions from multiple vendors. This means more customization and coding–-all at a greater expense to you. Dell is the only provider that can protect the entire IT landscape, enabling both visibility and security from the inside-out, as well as the outside-in. This simpler, more unified approach scales at your pace by delivering flexible and modular solutions. Limited Expensive & Inflexible Sweet Spot: Comprehensive & Flexible