Connected Security for a Connected World

Wesley Hwang SonicWALL

1 Powerful Disruptors: of businesses said their organizations will Cloud use cloud tools moderately 85% to extensively in the next 3 years.

By 2020 volume of data stored will Big Data 35 reach 35 Zettabytes

Mobility source shifts from 62%/38% Mobility corporate/personal owned to 37% 5X corporate owned and 63% personal owned

of the surveyed companies experienced Security some type of significant security incident and risk 79% within the past year that resulted in financial and/or reputational impact 2 Dell’s Vision and Strategy:

“We believe technology has the power to unlock human and business potential” -

3 Confidential The Power to Do More: Blue print Our Deliver technology solutions that enable people everywhere purpose to grow, thrive and reach their full potential

The leading provider of end-to-end scalable solutions Our Profitably Grow our Build/Integrate Our Expand Reach & Improve differentiated Business Solutions Portfolio our Customer Experience strategy

Our customers’ imperatives SCALE EFFICIENCY SPEED PRODUCTIVITY CUSTOMER CENTRICITY RISK MITIGATION Our end-to-end Integrating and Simplifying and Accelerating Connecting optimizing the securing through innovation with portfolio END USERS ENTERPRISE SOFTWARE SERVICES

4 Transform Connect Inform Protect

5 Big forces in the IT landscape are dramatically impacting our customers…

TRANSFORM CONNECT INFORM PROTECT Accelerate adoption: Embrace Turn data Overcome the , consumerization: into insights evolving security convergence, cloud BYOD and beyond threat & ensure compliance

… and they are also shaping how we think about our solutions.

6 Security should enable the business… and not inhibit it

A more Complex issue Businesseffective and efficient way • Threats are everywhere and needsto solve yourare constantly changing • Many technology options to Barrier to realizing challengesnot full IT benefits starts with mitigate threats adequatelyan addressedunderstandin g of how Dell A major pain Top 3 byleverages security • Security is identified in the top 3 as the solutionsour single greatest obstacle to realizing the collective full benefits of IT assets.

7 Business can’t stop to wait for security

Desire:How secure To embraceis your Cloud SaaS Data growth BYOD businessenvironment trends with all these new initiatives Challengecoming: into Securityplay often? gets in the way Web 2.0 Virtualization Compliance

8 Today, layers and silos get the security job done but often have gaps

Individual job done well in silos • Solutions often don’t work together • Solutions don’t work across the business Dell belief: there is a better way Silos and layers add stress to your resources • Difficult to get to work together • Limited security resources

9

1. Dell case study: 7-Eleven; 2, Salesforce.com Dell’s vision for tomorrow is Connected Security

Effective Security to Protect information enable Connected Security is security that… everywhere business • Shares and applies intelligence while also • Works with the business , end-to-end meeting the • Maintains flexibility and open architecture • Enables broad contextual awareness with needs of dynamic control Efficient security Work with the business

10 Dell’s approach to Connected Security Empowers you to solve complex security challenges

Detect Protect Network Identity and mitigate sensitive information Next Gen Firewall Access Governance security risks before with user access controls Secure Remote Access Privileged Acct Mgmt they impact your Email Security Identity Administration environment User Activity Monitoring

Respond EmbedData Security Services to breaches with security intoEncryption devices Incident Response quarantine and Protected and solutions Workspace with Managed Security Svcs remediation integratedSecurity security Tools Security & Risk Consult Configuration & Patch Threat Intelligence Management

11 11

Dell Managed Dell Security & Dell Threat Dell Incident Security Risk Intelligence Response

Services Consulting

Security Security Services

Application Network Data Security Security Security

Dell Identity & Access Dell Data Management Protection Dell SSL VPN Encryption

guys in guys Dell Security Let good good Let Tools Dell AppAssure

Dell Email Security Dell Next-Gen Firewall

guys out guys Dell Endpoint Keep bad Keep Management Dell Protected

Workspace

Scalable and Mid-Market design point: endpoint to data center to cloud

12 Endpoint Network Server Storage Cloud

& Devices & Infrastructure Infrastructure Dell Connected Security for a connected world Mitigate risks today while staying one step ahead

Connect security to Embed: Security embedded natively infrastructure into infrastructure

Protect & Predict, Respond: Connect security to Security solutions that gather, information analyze, report and act together

Connect security to Embed, Protect & Predict, Respond : Security that is no other security longer siloed…Data, User, Network, solutions Application, Services

13 Dell Connected Security proof points Data 638B encrypted intrusions and 30B+ prevented 4.2B protected security in 2011 malware on 7m Around • Over 2,000 security events attacks devices 9,500 professionals worldwide; analyzed blocked in customers elite security research teams daily Dell 2011 Dell Data Protection 2M devices SecureWorks • SC Magazine named IAM Over 18 Encryption WW Over 13,000 solution “SC Recommended” reporting trillion 40,000 patches in our on 40m applications 3 years in a row $14 trillion new patch feed users controlled in assets malware • 2M+ security appliances protected samples shipped… and growing daily! Dell Identity daily analyzed Dell and Access Dell every day Management SonicWALL KACE 102m managed identities

14 Dell Connected Security provides protection today, while preparing for tomorrow

Collaboration Effective between Protect information Connected Security is security that… everywhere security and the business • Leverages contextual awareness & shared helps you intelligence • Delivers superior security results while realize your working with the business Efficient true business potential Work across the business

15

1. Dell case study: 7-Eleven; 2, Salesforce.com Talk to us Dell SonicWALL – Wesley Hwang

Dell SecureWorks

Philip Simpson Lee Evans

Alan Coburn

16 17