MT54:
Better Security
is Better Business
Tom Ricoy, Director of Marketing, Data Security Solutions, Dell
Dell - Internal Use - Confidential2 of Y
Growing impact of failure
 $445 billion global cost of
cyber crime
 $3.8M average data breach
cost up 38%
 $254M 1H16 US
ransomware payments
Meeting worker expectations
 65% of employees sometimes
work at home
 78% employees in highly
regulated industries use free
cloud services
Better security is better business
Dell - Internal Use - Confidential3 of Y
But more difficult than ever
435,000 new
malware variants
produced daily
7 million phishing
campaigns monthly
Every 53
seconds a
laptop is lost
or stolen
1:22 average
time before
compromise
for phishing
campaign
205 days
elapsed time
between
compromise
and detection
95% of all data
breaches originate
at endpoint
77% of
organizations
say they
experienced a
compromise in
last 12 months
Three big
challenges
Data as the new currency,
needs to be protected from
threats, both internal and
external
Trade off between workforce
innovation and security
Too many vendors, consoles
agents; not efficient, not
secure
Dell - Internal Use - Confidential5 of Y
What should you do?
Define a cyber-security plan. Ensure it is aligned with your business
strategy and imperatives
Secure your endpoints. Conduct end user education. Embrace modern
techniques for end point security
Defense in depth. No silver bullet. Protect yourself with complement,
layered security.
Choose a strategic partner. Simplify and improve security through
integrated portfolio.
Dell - Internal Use - Confidential6 of Y
Converged data-centric security portfolio
Data Threat Identity Management
Data protected at
rest, in motion
and in use,
backed-up to
avoid data loss
Prevention,
detection and
remediation for
endpoints
Access to the
right person for
the right data at
the right time
Modern
management for
endpoints and
devices
Best-in-class solutions…
together
Dell - Internal Use - Confidential8 of Y
Endpoint Data Security and Management
 Dell Encryption
Data Threat Identity Management
 Dell Threat
Defense (SB)
 Dell Security
Tools
 Dell Command
Dell Endpoint Security Suite Enterprise
Dell - Internal Use - Confidential9 of Y
Endpoint Data Security and Management
 Dell Encryption
 Mozy Pro
 Mozy Enterprise
Data Threat Identity Management
 Dell Threat
Defense (SB)
 RSA NetWitness
Endpoint
 Dell Security
Tools
 RSA SecurID
Access
 Dell Command
 AirWatch Green
 AirWatch Blue
 AirWatch
ExpressDell Endpoint Security Suite Enterprise
Dell - Internal Use - Confidential10 of Y
Endpoint Data Security and Management
 Dell Encryption
 Mozy Pro
 Mozy Enterprise
Data Threat Identity Management
 Dell Threat
Defense (SB)
 RSA NetWitness
Endpoint
 Dell Security
Tools
 RSA SecurID
Access
 Dell Command
 AirWatch Green
 AirWatch Blue
 AirWatch
ExpressDell Endpoint Security Suite Enterprise
Dell - Internal Use - Confidential11 of Y
X`X`
AirWatch Blue, Green, and ExpressMozyPro and MozyEnterprise
 Leader in Gartner MQ
for EMM Suites for 6th
consecutive year
 Largest EMM vendor in
IDC Worldwide EMM
software market
 Leader in Forrester
Wave EMM Report
 “Top Player” in Radicati
EMM Market Quadrant
• Any device + any use
case + unified
management
• Modern management
framework
• Low TCO, simpler,
flexible
 75% of businesses are
not confident in their
ability to restore data
 $1,325 is the average
cost of a recovering
data on a hard drive
 $1,500 is the average
productivity loss of
estimate
• Cloud based sync, backup
and restore
• Continuous backup
• 90 days of version protection
• Protect against data
vulnerabilities due to user
error, hardware failure,
malware attack and natural
disaster
Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
Dell - Internal Use - Confidential12 of Y
X`X`
RSA NetWitness EndpointRSA SecurID Access
 70-90% of malware
samples are unique to
an organization
 390k new malware per
day
 Serving 200+ of the
Fortune 500
• Behavioral-based
detection of unique,
targeted and unknown
threats
• Respond in minutes,
not months
• Lightweight kernel-
level agent for
continuous endpoint
monitoring
 More than 25 years in
the market
 Gartner leader’s
quadrant
 55 million+ tokens
shipped
 Only 20% of a user
population use multi-
factor authentication
• Multi-factor authentication
• Combining something you
know + something you have
• Time based authentication so
continuous
Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
Dell - Internal Use - Confidential13 of Y
Taking steps towards a more secure tomorrow
Crawl: Joint GTM
1 2 3
• Single purchase
path
• Solution
interoperability
and validation
testing
• Solution bundles
targeting key
customer needs
• Dell ProSupport
for integrated
technical support
• Endpoint agents
and management
console integration
• Shared threat
information
• Lifecycle endpoint
recovery
Timing: 1H17 Timing: 2H17Timing: 2H16
Dell - Internal Use - Confidential14 of Y
Better together, stronger ahead
Common UI and workflow,
single console and
consolidated agent
Simplified management.
Superior security
Integrated Security
Provide insights for data,
security and user behavior
Better forensics and
improved security defenses
and user tools
Security Analytics
Efficient device management
and seamless restoration
Improved user uptime
and cost savings
Endpoint Management &
Resiliency
Strategic Focus Areas for Cross-Product Development
Solution built
to address
today’s security
environment
Transparent
protection of mobile,
collaborative end
users
Simplified,
integrated
inter-operability,
from one partner
Why Dell and why now?
Dell - Internal Use - Confidential16 of Y
Transforming security everywhere…
with our unique and unprecedented
combination of security and management
capabilities… simplified and converged
Visit demos at the Dell
EMC World Expo:
 Dell Endpoint Security
Suite Enterprise
 Mozy, RSA, and AirWatch
security solutions
Learn more at
DellSecurity.dell.com
Let’s talk
Dell - Internal Use - Confidential18 of Y

MT54 Better security is better business

  • 1.
    MT54: Better Security is BetterBusiness Tom Ricoy, Director of Marketing, Data Security Solutions, Dell
  • 2.
    Dell - InternalUse - Confidential2 of Y Growing impact of failure  $445 billion global cost of cyber crime  $3.8M average data breach cost up 38%  $254M 1H16 US ransomware payments Meeting worker expectations  65% of employees sometimes work at home  78% employees in highly regulated industries use free cloud services Better security is better business
  • 3.
    Dell - InternalUse - Confidential3 of Y But more difficult than ever 435,000 new malware variants produced daily 7 million phishing campaigns monthly Every 53 seconds a laptop is lost or stolen 1:22 average time before compromise for phishing campaign 205 days elapsed time between compromise and detection 95% of all data breaches originate at endpoint 77% of organizations say they experienced a compromise in last 12 months
  • 4.
    Three big challenges Data asthe new currency, needs to be protected from threats, both internal and external Trade off between workforce innovation and security Too many vendors, consoles agents; not efficient, not secure
  • 5.
    Dell - InternalUse - Confidential5 of Y What should you do? Define a cyber-security plan. Ensure it is aligned with your business strategy and imperatives Secure your endpoints. Conduct end user education. Embrace modern techniques for end point security Defense in depth. No silver bullet. Protect yourself with complement, layered security. Choose a strategic partner. Simplify and improve security through integrated portfolio.
  • 6.
    Dell - InternalUse - Confidential6 of Y Converged data-centric security portfolio Data Threat Identity Management Data protected at rest, in motion and in use, backed-up to avoid data loss Prevention, detection and remediation for endpoints Access to the right person for the right data at the right time Modern management for endpoints and devices
  • 7.
  • 8.
    Dell - InternalUse - Confidential8 of Y Endpoint Data Security and Management  Dell Encryption Data Threat Identity Management  Dell Threat Defense (SB)  Dell Security Tools  Dell Command Dell Endpoint Security Suite Enterprise
  • 9.
    Dell - InternalUse - Confidential9 of Y Endpoint Data Security and Management  Dell Encryption  Mozy Pro  Mozy Enterprise Data Threat Identity Management  Dell Threat Defense (SB)  RSA NetWitness Endpoint  Dell Security Tools  RSA SecurID Access  Dell Command  AirWatch Green  AirWatch Blue  AirWatch ExpressDell Endpoint Security Suite Enterprise
  • 10.
    Dell - InternalUse - Confidential10 of Y Endpoint Data Security and Management  Dell Encryption  Mozy Pro  Mozy Enterprise Data Threat Identity Management  Dell Threat Defense (SB)  RSA NetWitness Endpoint  Dell Security Tools  RSA SecurID Access  Dell Command  AirWatch Green  AirWatch Blue  AirWatch ExpressDell Endpoint Security Suite Enterprise
  • 11.
    Dell - InternalUse - Confidential11 of Y X`X` AirWatch Blue, Green, and ExpressMozyPro and MozyEnterprise  Leader in Gartner MQ for EMM Suites for 6th consecutive year  Largest EMM vendor in IDC Worldwide EMM software market  Leader in Forrester Wave EMM Report  “Top Player” in Radicati EMM Market Quadrant • Any device + any use case + unified management • Modern management framework • Low TCO, simpler, flexible  75% of businesses are not confident in their ability to restore data  $1,325 is the average cost of a recovering data on a hard drive  $1,500 is the average productivity loss of estimate • Cloud based sync, backup and restore • Continuous backup • 90 days of version protection • Protect against data vulnerabilities due to user error, hardware failure, malware attack and natural disaster Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
  • 12.
    Dell - InternalUse - Confidential12 of Y X`X` RSA NetWitness EndpointRSA SecurID Access  70-90% of malware samples are unique to an organization  390k new malware per day  Serving 200+ of the Fortune 500 • Behavioral-based detection of unique, targeted and unknown threats • Respond in minutes, not months • Lightweight kernel- level agent for continuous endpoint monitoring  More than 25 years in the market  Gartner leader’s quadrant  55 million+ tokens shipped  Only 20% of a user population use multi- factor authentication • Multi-factor authentication • Combining something you know + something you have • Time based authentication so continuous Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
  • 13.
    Dell - InternalUse - Confidential13 of Y Taking steps towards a more secure tomorrow Crawl: Joint GTM 1 2 3 • Single purchase path • Solution interoperability and validation testing • Solution bundles targeting key customer needs • Dell ProSupport for integrated technical support • Endpoint agents and management console integration • Shared threat information • Lifecycle endpoint recovery Timing: 1H17 Timing: 2H17Timing: 2H16
  • 14.
    Dell - InternalUse - Confidential14 of Y Better together, stronger ahead Common UI and workflow, single console and consolidated agent Simplified management. Superior security Integrated Security Provide insights for data, security and user behavior Better forensics and improved security defenses and user tools Security Analytics Efficient device management and seamless restoration Improved user uptime and cost savings Endpoint Management & Resiliency Strategic Focus Areas for Cross-Product Development
  • 15.
    Solution built to address today’ssecurity environment Transparent protection of mobile, collaborative end users Simplified, integrated inter-operability, from one partner Why Dell and why now?
  • 16.
    Dell - InternalUse - Confidential16 of Y Transforming security everywhere… with our unique and unprecedented combination of security and management capabilities… simplified and converged
  • 17.
    Visit demos atthe Dell EMC World Expo:  Dell Endpoint Security Suite Enterprise  Mozy, RSA, and AirWatch security solutions Learn more at DellSecurity.dell.com Let’s talk
  • 18.
    Dell - InternalUse - Confidential18 of Y