Dell World 2014 
Achieve deeper network, mobile and email security with Dell Security solutions 
John Gordineer, Director of Product Marketing Dell Security, November 2014
Dell World 2014 
Have you seen these headlines?
Dell World 2014 
Have you seen these headlines?
Dell World 2014 
Have you seen these headlines?
Dell World 2014 
Have you seen these headlines?
Dell World 2014 
Have you seen these headlines?
Dell World 2014 
In 2013, 89% of breaches were caused by intrusions or malware
Dell World 2014 
69% of attacks are malware 
80% malware in 2012 were redirects from legitimate sites 
81% of respondents admit to shutting off security functionality to improve network performance
Dell World 2014 
69% of attacks are malware 
80% malware in 2012 were redirects from legitimate sites 
81% of respondents admit to shutting off security functionality to improve network performance
Dell World 2014 
New malware samples discovered by researchers every day, according to Georgia Tech 
100,000 
$5.4M 
Average cost of a US data breach in 2013, according to Ponemon Institute research 
Estimated cost to US businesses from data breaches in 2011, says Online Trust Alliance 
$6.5B 
60% 
7,000+ 
New vulnerabilities 
annually tracked by the Dell 
Counter Threat Unit 
New malware samples detected by Antivirus solutions, Cyveillance study shows 
19% 
Estimated number of healthcare providers with 2 or more breaches in the last two years
Dell World 2014 
Application Chaos 
Unimportant Apps 
Important Apps
Dell World 2014 
According to NSS labs estimate, 50% of Internet traffic is now encrypted
Dell World 2014 
Ransomware has emerged
Dell World 2014 
Gartner predicts by 2017, half of employers will require employees to supply their own device for work purposes
Dell World 2014 
The BYOD Challenge 
Personal 
Business 
Increased business risks: 
•Corporate data loss 
•Malware attack 
•Personal data privacy compliance
Dell World 2014 
SOURCE: Yankee Group, June 2012 
Top five mobile threats 
1.Data loss from lost stolen of decommissioned devices 
2.Information stealing mobile malware 
3.Data loss and data leakage through poorly written third party applications 
4.Vulnerabilities within devices, OS design and third party applications 
5.Insecure Wi-Fi network or rogue access point
Dell World 2014 
Volume of spam per day in 2013 
Number of unique phishing sites detected in March 2014 
44,000 
557 
Attack on brands in Q1 2014 
20 million 
Unique malware threats in 2013 
69 billion 
Of all email that enters a typical corporation is bad 
90%
Dell World 2014 
Brands under attack
Dell World 2014 
Solving the problems
Dell World 2014 
Secure your network
Dell World 2014 
Threats have evolved but firewalls & IPS have not
Dell World 2014 
Next-generation firewall technology 
1.Stateful Packet Inspection 
2.Intrusion Prevention 
3.Threat Prevention (virus, malware) 
4.Application Control 
5.SSL Decryption 
6.User Identification 
Stateful Packet Inspection 
Deep Packet Inspection
Dell World 2014 
Next-generation firewall (NGFW) 
Breaking the malware cycle 
Compromised “Good” Site 
Malware Hosting Site 
Page Visit 
Malware Request 
Exploit 
Malware 
SSL Decryption 
URL Filtering 
Intrusion Prevention 
Network Anti-Virus 
Cloud Anti-Virus 
Botnet Filtering
Dell World 2014 
Overcoming application chaos… 
demands advanced application intelligence… 
focused on users, apps and content.
Dell World 2014 
Application intelligence and control 
Policy 
Identify 
Categorize 
Control 
? 
? 
? 
? 
? 
? 
? 
Visualization
Dell World 2014 
Secure your mobile access
Dell World 2014 
Mobile security– managed device 
Network
Dell World 2014 
Mobile security – personal device 
Trusted User? 
Trusted Device? 
Trusted Mobile apps? 
Trusted User 
Trusted Device 
Trusted Mobile apps 
Authenticate user 
Validate device ID and security posture 
Enforce BYOD policy acceptance 
Connect only authorized apps to VPN and resources 
Network
Dell World 2014 
Mobility Management and Security Solutions 
EMM functions 
Real-time reporting and alerts 
User self-service 
Secure access to corporate resources 
Systems, device, app and content management 
Endpoint management 
Secure Mobile Access 
EMM 
Container management
Dell World 2014 
Secure your email
Dell World 2014 
Email security – beyond anti-spam 
Advanced Protection 
Spam, Virus, Phishing 
Brand Protection 
Compliance & Encryption
Dell World 2014 
Advanced protection 
Connection management rejects up to 80% of spam and other threats before filtering 
Filtering removes remaining spam and delivers good email to the email server
Dell World 2014 
The big five regulations – what’s common? 
Encryption of data
Dell World 2014 
Brand protection: who is sending emails on your behalf? 
I need visibility 
I can take action 
I can align everything to the known and shrink the unknown 
Known Servers 
Unconfirmed sources 
Threats and unknown sources 
I have no idea
Dell World 2014 
How Dell can help
Dell World 2014 
36 
Dell delivers best-in-class security solutions 
Identity & Access Mgmt 
Identity Governance 
Privileged Mgmt 
Access Mgmt 
Compliance & IT Gov 
Security Services 
Incident Response 
Managed Security Svcs 
Security & Risk Consult 
Threat Intelligence 
Data/Endpoint 
Encryption 
Protected Workspace 
Configuration & Patch Management 
Secure Cloud Client 
Network 
Next Gen Firewall 
Secure Mobile Access 
Email Security
Dell World 2014 
Dell SonicWALL security portfolio 
Network security 
Secure mobile access 
Email security 
Products (appliances) 
Products (appliance, virtual appliance) 
Products (appliance, virtual appliance, hosted, software) 
Add-on security services and app 
Add-on security services 
Add-on security services 
Policy and management 
Add-on application 
Hosted 
Software 
Virtual appliance 
Virtual appliance 
WAN Acceleration 
Clean Wireless – SonicPoint N Series
Dell World 2014 
Dell SonicWALL Next-Generation Firewalls 
SuperMassive E10800 
SuperMassive E10400 
SMB/Campus/Branch 
Enterprise, Data Center 
SuperMassive Series 
TZ 215/W 
TZ 205/W 
TZ 105/W 
SuperMassive 9600 
SuperMassive 9400 
SuperMassive 9200 
TZ Series 
NSA 4600 
NSA 3600 
NSA 2600 
NSA 220/250M 
NSA 6600 
NSA 5600 
NSA Series
Dell World 2014 
Cutting-edge threat prevention 
Botnet command and control traffic detection and blocking 
Comprehensive signatures, server and client-side attacks 
Denial of Service / Flood detection and prevention 
Protocol abuse / anomaly based detection 
Geographical IP monitoring and blocking 
Sophisticated anti-evasion technology 
SSL traffic inspection 
Visualization and reporting
Dell World 2014 
E-Class Secure Remote Access Appliances 
Secure Remote Access Appliances 
Dell SonicWALL Secure Mobile Access 
SRA EX7000 
SRA EX6000 
Virtual Appliance 
SRA EX9000 
Simple, policy- enforced per app VPN access to corporate data and resources without compromising security 
Secure mobile access for all users, devices, apps and resources 
Spike License 
Secure Virtual Assist 
Advanced Reporting 
Native Access Modules 
Mobile Connect 
End Point Control 
SRA 1600 
Virtual Appliance 
SRA 4600 
Secure Virtual Access 
Web App Firewall 
Secure Virtual Assist 
Spike License 
Mobile Connect 
End Point Control 
Secure Virtual Meeting
Dell World 2014 
Dell SonicWALL Secure Mobile Access solution 
•Only per app VPN solution that can support any mobile app or container without modification and support iOS, Mac OSX, Android and Kindle 
Simplify per app VPN 
•Mobile device policy enforcement and management 
Achieve BYOD compliance 
•Per app VPN access controls, mobile app and device integrity validation and user authentication 
Protect from threats 
•Scalable, network-level access to more resources including web, client/server, hosted virtual desktop and back connect such as VoIP 
Access more resources 
Enable mobile worker productivity while protecting from threats
Dell World 2014 
E-Class Email Security Series 
Email Security Series 
ESA ES8300 
Virtual Appliance 
E-Class Software 
ESA 4300/3300 
Virtual Appliance 
Software 
•Stops spam, viruses and phishing attacks 
•Stops leaks of corporate and confidential information 
•Flexibility for corporate control and user empowerment 
•Easy-to-install and manage for a quick return on investment 
•Powerful granular reporting 
Dell SonicWALL Email Security 
Hosted Email Security 
Email Protection 
Emil Anti-Virus 
Emil Compliance 
Email Protection 
Emil Anti-Virus 
Emil Compliance
Dell World 2014 
Deployment platform choice to best meet infrastructure requirements 
On-premises 
Hosted Email Security 
Comprehensive Anti-Spam Service (CASS) 
Hardware 
Windows software 
Virtual appliance
Dell World 2014 
Dell SonicWALL Email Security 
Proven expertise, industry leading technology 
Proven expertise 
•10,000+ customer installations 
•2 million+ mailboxes protected 
•Global deployments (14+ languages supported) 
•Large customer installations with tens and thousands of mailboxes 
•24 x 7 on-line and phone support Industry leading technology 
•Email Security patent leader (14 approved, many pending) 
•SC Magazine 5 star overall rating
Dell Software 
Gartner Magic Quadrant 
•Unified Threat Management - Leader 
•Secure Remote Access - Visionary 
NSS Labs Security Value Maps 
•Next-Generation Firewall: Recommended (3 years in a row) 
•Intrusion Prevention System: Recommended (2 years straight) 
ICSA Labs 
•Enterprise Firewall Certification 
•Next-Generation Firewall Evaluated 
3rd party validation: Gartner, NSS Labs, ICSA Labs
Dell World 2014 
The Dell difference. Better. Faster. Lower TCO. 
•Demonstrated better security * than leading enterprise firewalls 
•Tested fastest in the industry for detecting and dropping malware hidden in encrypted traffic 
•Disruptively low TCO provided by a combination of low upfront cost and advanced centralized management tools 
“Overall, in choosing Dell 
SonicWALL over Check Point, our cost-savings 
approximate $100,000.” 
* 2014 NSS Labs NGFW Secure Value Map and Comparative Analysis
Dell World 2014 
Snapshot 
•Public school district with 26,000 students and 4,800 teachers /staff 
•21 elementary schools, six middle schools and seven high schools 
Challenge 
•District is tasked with securing on its network over 9,000 student and employee mobile devices at any one time. 
Results 
•By deploying a Dell SonicWALL solution, district cuts costs by 50% 
•Students increase access to critical educational resources; teachers can access other schools around the world 
•Mobile device users are authenticated, ensuring secure BYOD 
Hall County 
Schools
Dell World 2014 
“We increased our return on investment by using the Dell SonicWALL SRA 4600 with the Dell SonicWALL SuperMassive 9000 because we offload VPN traffic from our main firewall to the SRA. It took an engineer under an hour to set up a portal for vendors and a portal for employees, customizing each with Broncos themes.” 
Russ Trainor, VP of Technology, Denver Broncos 
Denver Broncos
Dell World 2014 
“When customers look at the Dell SSL VPN solution, they’ll know that it’s been developed to meet our manageability and scalability needs as a large enterprise. Very few other VPN vendors could meet these needs.” Alan Daines, Director of Security Engineering and Operations at Dell 
Dell
Dell World 2014 
Thank you.
Want to learn more about 
Dell’s security solutions? 
Learn via email. Start here. 
Sign me up!

Achieving Deeper Network, Mobile and Email Security

  • 1.
    Dell World 2014 Achieve deeper network, mobile and email security with Dell Security solutions John Gordineer, Director of Product Marketing Dell Security, November 2014
  • 2.
    Dell World 2014 Have you seen these headlines?
  • 3.
    Dell World 2014 Have you seen these headlines?
  • 4.
    Dell World 2014 Have you seen these headlines?
  • 5.
    Dell World 2014 Have you seen these headlines?
  • 6.
    Dell World 2014 Have you seen these headlines?
  • 7.
    Dell World 2014 In 2013, 89% of breaches were caused by intrusions or malware
  • 8.
    Dell World 2014 69% of attacks are malware 80% malware in 2012 were redirects from legitimate sites 81% of respondents admit to shutting off security functionality to improve network performance
  • 9.
    Dell World 2014 69% of attacks are malware 80% malware in 2012 were redirects from legitimate sites 81% of respondents admit to shutting off security functionality to improve network performance
  • 10.
    Dell World 2014 New malware samples discovered by researchers every day, according to Georgia Tech 100,000 $5.4M Average cost of a US data breach in 2013, according to Ponemon Institute research Estimated cost to US businesses from data breaches in 2011, says Online Trust Alliance $6.5B 60% 7,000+ New vulnerabilities annually tracked by the Dell Counter Threat Unit New malware samples detected by Antivirus solutions, Cyveillance study shows 19% Estimated number of healthcare providers with 2 or more breaches in the last two years
  • 11.
    Dell World 2014 Application Chaos Unimportant Apps Important Apps
  • 12.
    Dell World 2014 According to NSS labs estimate, 50% of Internet traffic is now encrypted
  • 13.
    Dell World 2014 Ransomware has emerged
  • 14.
    Dell World 2014 Gartner predicts by 2017, half of employers will require employees to supply their own device for work purposes
  • 15.
    Dell World 2014 The BYOD Challenge Personal Business Increased business risks: •Corporate data loss •Malware attack •Personal data privacy compliance
  • 16.
    Dell World 2014 SOURCE: Yankee Group, June 2012 Top five mobile threats 1.Data loss from lost stolen of decommissioned devices 2.Information stealing mobile malware 3.Data loss and data leakage through poorly written third party applications 4.Vulnerabilities within devices, OS design and third party applications 5.Insecure Wi-Fi network or rogue access point
  • 17.
    Dell World 2014 Volume of spam per day in 2013 Number of unique phishing sites detected in March 2014 44,000 557 Attack on brands in Q1 2014 20 million Unique malware threats in 2013 69 billion Of all email that enters a typical corporation is bad 90%
  • 18.
    Dell World 2014 Brands under attack
  • 19.
    Dell World 2014 Solving the problems
  • 20.
    Dell World 2014 Secure your network
  • 21.
    Dell World 2014 Threats have evolved but firewalls & IPS have not
  • 22.
    Dell World 2014 Next-generation firewall technology 1.Stateful Packet Inspection 2.Intrusion Prevention 3.Threat Prevention (virus, malware) 4.Application Control 5.SSL Decryption 6.User Identification Stateful Packet Inspection Deep Packet Inspection
  • 23.
    Dell World 2014 Next-generation firewall (NGFW) Breaking the malware cycle Compromised “Good” Site Malware Hosting Site Page Visit Malware Request Exploit Malware SSL Decryption URL Filtering Intrusion Prevention Network Anti-Virus Cloud Anti-Virus Botnet Filtering
  • 24.
    Dell World 2014 Overcoming application chaos… demands advanced application intelligence… focused on users, apps and content.
  • 25.
    Dell World 2014 Application intelligence and control Policy Identify Categorize Control ? ? ? ? ? ? ? Visualization
  • 26.
    Dell World 2014 Secure your mobile access
  • 27.
    Dell World 2014 Mobile security– managed device Network
  • 28.
    Dell World 2014 Mobile security – personal device Trusted User? Trusted Device? Trusted Mobile apps? Trusted User Trusted Device Trusted Mobile apps Authenticate user Validate device ID and security posture Enforce BYOD policy acceptance Connect only authorized apps to VPN and resources Network
  • 29.
    Dell World 2014 Mobility Management and Security Solutions EMM functions Real-time reporting and alerts User self-service Secure access to corporate resources Systems, device, app and content management Endpoint management Secure Mobile Access EMM Container management
  • 30.
    Dell World 2014 Secure your email
  • 31.
    Dell World 2014 Email security – beyond anti-spam Advanced Protection Spam, Virus, Phishing Brand Protection Compliance & Encryption
  • 32.
    Dell World 2014 Advanced protection Connection management rejects up to 80% of spam and other threats before filtering Filtering removes remaining spam and delivers good email to the email server
  • 33.
    Dell World 2014 The big five regulations – what’s common? Encryption of data
  • 34.
    Dell World 2014 Brand protection: who is sending emails on your behalf? I need visibility I can take action I can align everything to the known and shrink the unknown Known Servers Unconfirmed sources Threats and unknown sources I have no idea
  • 35.
    Dell World 2014 How Dell can help
  • 36.
    Dell World 2014 36 Dell delivers best-in-class security solutions Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov Security Services Incident Response Managed Security Svcs Security & Risk Consult Threat Intelligence Data/Endpoint Encryption Protected Workspace Configuration & Patch Management Secure Cloud Client Network Next Gen Firewall Secure Mobile Access Email Security
  • 37.
    Dell World 2014 Dell SonicWALL security portfolio Network security Secure mobile access Email security Products (appliances) Products (appliance, virtual appliance) Products (appliance, virtual appliance, hosted, software) Add-on security services and app Add-on security services Add-on security services Policy and management Add-on application Hosted Software Virtual appliance Virtual appliance WAN Acceleration Clean Wireless – SonicPoint N Series
  • 38.
    Dell World 2014 Dell SonicWALL Next-Generation Firewalls SuperMassive E10800 SuperMassive E10400 SMB/Campus/Branch Enterprise, Data Center SuperMassive Series TZ 215/W TZ 205/W TZ 105/W SuperMassive 9600 SuperMassive 9400 SuperMassive 9200 TZ Series NSA 4600 NSA 3600 NSA 2600 NSA 220/250M NSA 6600 NSA 5600 NSA Series
  • 39.
    Dell World 2014 Cutting-edge threat prevention Botnet command and control traffic detection and blocking Comprehensive signatures, server and client-side attacks Denial of Service / Flood detection and prevention Protocol abuse / anomaly based detection Geographical IP monitoring and blocking Sophisticated anti-evasion technology SSL traffic inspection Visualization and reporting
  • 40.
    Dell World 2014 E-Class Secure Remote Access Appliances Secure Remote Access Appliances Dell SonicWALL Secure Mobile Access SRA EX7000 SRA EX6000 Virtual Appliance SRA EX9000 Simple, policy- enforced per app VPN access to corporate data and resources without compromising security Secure mobile access for all users, devices, apps and resources Spike License Secure Virtual Assist Advanced Reporting Native Access Modules Mobile Connect End Point Control SRA 1600 Virtual Appliance SRA 4600 Secure Virtual Access Web App Firewall Secure Virtual Assist Spike License Mobile Connect End Point Control Secure Virtual Meeting
  • 41.
    Dell World 2014 Dell SonicWALL Secure Mobile Access solution •Only per app VPN solution that can support any mobile app or container without modification and support iOS, Mac OSX, Android and Kindle Simplify per app VPN •Mobile device policy enforcement and management Achieve BYOD compliance •Per app VPN access controls, mobile app and device integrity validation and user authentication Protect from threats •Scalable, network-level access to more resources including web, client/server, hosted virtual desktop and back connect such as VoIP Access more resources Enable mobile worker productivity while protecting from threats
  • 42.
    Dell World 2014 E-Class Email Security Series Email Security Series ESA ES8300 Virtual Appliance E-Class Software ESA 4300/3300 Virtual Appliance Software •Stops spam, viruses and phishing attacks •Stops leaks of corporate and confidential information •Flexibility for corporate control and user empowerment •Easy-to-install and manage for a quick return on investment •Powerful granular reporting Dell SonicWALL Email Security Hosted Email Security Email Protection Emil Anti-Virus Emil Compliance Email Protection Emil Anti-Virus Emil Compliance
  • 43.
    Dell World 2014 Deployment platform choice to best meet infrastructure requirements On-premises Hosted Email Security Comprehensive Anti-Spam Service (CASS) Hardware Windows software Virtual appliance
  • 44.
    Dell World 2014 Dell SonicWALL Email Security Proven expertise, industry leading technology Proven expertise •10,000+ customer installations •2 million+ mailboxes protected •Global deployments (14+ languages supported) •Large customer installations with tens and thousands of mailboxes •24 x 7 on-line and phone support Industry leading technology •Email Security patent leader (14 approved, many pending) •SC Magazine 5 star overall rating
  • 45.
    Dell Software GartnerMagic Quadrant •Unified Threat Management - Leader •Secure Remote Access - Visionary NSS Labs Security Value Maps •Next-Generation Firewall: Recommended (3 years in a row) •Intrusion Prevention System: Recommended (2 years straight) ICSA Labs •Enterprise Firewall Certification •Next-Generation Firewall Evaluated 3rd party validation: Gartner, NSS Labs, ICSA Labs
  • 46.
    Dell World 2014 The Dell difference. Better. Faster. Lower TCO. •Demonstrated better security * than leading enterprise firewalls •Tested fastest in the industry for detecting and dropping malware hidden in encrypted traffic •Disruptively low TCO provided by a combination of low upfront cost and advanced centralized management tools “Overall, in choosing Dell SonicWALL over Check Point, our cost-savings approximate $100,000.” * 2014 NSS Labs NGFW Secure Value Map and Comparative Analysis
  • 47.
    Dell World 2014 Snapshot •Public school district with 26,000 students and 4,800 teachers /staff •21 elementary schools, six middle schools and seven high schools Challenge •District is tasked with securing on its network over 9,000 student and employee mobile devices at any one time. Results •By deploying a Dell SonicWALL solution, district cuts costs by 50% •Students increase access to critical educational resources; teachers can access other schools around the world •Mobile device users are authenticated, ensuring secure BYOD Hall County Schools
  • 48.
    Dell World 2014 “We increased our return on investment by using the Dell SonicWALL SRA 4600 with the Dell SonicWALL SuperMassive 9000 because we offload VPN traffic from our main firewall to the SRA. It took an engineer under an hour to set up a portal for vendors and a portal for employees, customizing each with Broncos themes.” Russ Trainor, VP of Technology, Denver Broncos Denver Broncos
  • 49.
    Dell World 2014 “When customers look at the Dell SSL VPN solution, they’ll know that it’s been developed to meet our manageability and scalability needs as a large enterprise. Very few other VPN vendors could meet these needs.” Alan Daines, Director of Security Engineering and Operations at Dell Dell
  • 50.
    Dell World 2014 Thank you.
  • 51.
    Want to learnmore about Dell’s security solutions? Learn via email. Start here. Sign me up!