Connected Security for a Connected World
Wesley Hwang Dell SonicWALL
1 Powerful Disruptors: of businesses said their organizations will Cloud use cloud tools moderately 85% to extensively in the next 3 years.
By 2020 volume of data stored will Big Data 35 reach 35 Zettabytes
Mobility source shifts from 62%/38% Mobility corporate/personal owned to 37% 5X corporate owned and 63% personal owned
of the surveyed companies experienced Security some type of significant security incident and risk 79% within the past year that resulted in financial and/or reputational impact 2 Dell’s Vision and Strategy:
“We believe technology has the power to unlock human and business potential” -Michael Dell
3 Confidential The Power to Do More: Blue print Our Deliver technology solutions that enable people everywhere purpose to grow, thrive and reach their full potential
The leading provider of end-to-end scalable solutions Our Profitably Grow our Build/Integrate Our Expand Reach & Improve differentiated Business Solutions Portfolio our Customer Experience strategy
Our customers’ imperatives SCALE EFFICIENCY SPEED PRODUCTIVITY CUSTOMER CENTRICITY RISK MITIGATION Our end-to-end Integrating and Simplifying and Accelerating Connecting optimizing the securing through innovation with portfolio END USERS ENTERPRISE SOFTWARE SERVICES
4 Transform Connect Inform Protect
5 Big forces in the IT landscape are dramatically impacting our customers…
TRANSFORM CONNECT INFORM PROTECT Accelerate adoption: Embrace Turn data Overcome the virtualization, consumerization: into insights evolving security convergence, cloud BYOD and beyond threat & ensure compliance
… and they are also shaping how we think about our solutions.
6 Security should enable the business… and not inhibit it
A more Complex issue Businesseffective and efficient way • Threats are everywhere and needsto solve yourare constantly changing • Many technology options to Barrier to realizing challengesnot full IT benefits starts with mitigate threats adequatelyan addressedunderstandin g of how Dell A major pain Top 3 byleverages security • Security is identified in the top 3 as the solutionsour single greatest obstacle to realizing the collective full benefits of IT assets.
7 Business can’t stop to wait for security
Desire:How secure To embraceis your Cloud SaaS Data growth BYOD businessenvironment trends with all these new initiatives Challengecoming: into Securityplay often? gets in the way Web 2.0 Virtualization Compliance
8 Today, layers and silos get the security job done but often have gaps
Individual job done well in silos • Solutions often don’t work together • Solutions don’t work across the business Dell belief: there is a better way Silos and layers add stress to your resources • Difficult to get to work together • Limited security resources
9
1. Dell case study: 7-Eleven; 2, Salesforce.com Dell’s vision for tomorrow is Connected Security
Effective Security to Protect information enable Connected Security is security that… everywhere business • Shares and applies intelligence while also • Works with the business , end-to-end meeting the • Maintains flexibility and open architecture • Enables broad contextual awareness with needs of dynamic control Efficient security Work with the business
10 Dell’s approach to Connected Security Empowers you to solve complex security challenges
Detect Protect Network Identity and mitigate sensitive information Next Gen Firewall Access Governance security risks before with user access controls Secure Remote Access Privileged Acct Mgmt they impact your Email Security Identity Administration environment User Activity Monitoring
Respond EmbedData Security Services to breaches with security intoEncryption devices Incident Response quarantine and Protected and solutions Workspace with Managed Security Svcs remediation integratedSecurity security Tools Security & Risk Consult Configuration & Patch Threat Intelligence Management
11 11
Dell Managed Dell Security & Dell Threat Dell Incident Security Risk Intelligence Response
Services Consulting
Security Security Services
Application Network Data Security Security Security
Dell Identity & Access Dell Data Management Protection Dell SSL VPN Encryption
guys in guys Dell Security Let good good Let Tools Dell AppAssure
Dell Email Security Dell Wyse Dell Next-Gen Firewall
guys out guys Dell Endpoint Keep bad Keep Management Dell Protected
Workspace
Scalable and Mid-Market design point: endpoint to data center to cloud
12 Endpoint Network Server Storage Cloud
& Devices & Infrastructure Infrastructure Dell Connected Security for a connected world Mitigate risks today while staying one step ahead
Connect security to Embed: Security embedded natively infrastructure into infrastructure
Protect & Predict, Respond: Connect security to Security solutions that gather, information analyze, report and act together
Connect security to Embed, Protect & Predict, Respond : Security that is no other security longer siloed…Data, User, Network, solutions Application, Services
13 Dell Connected Security proof points Data 638B encrypted intrusions and 30B+ prevented 4.2B protected security in 2011 malware on 7m Around • Over 2,000 security events attacks devices 9,500 professionals worldwide; analyzed blocked in customers elite security research teams daily Dell 2011 Dell Data Protection 2M devices SecureWorks • SC Magazine named IAM Over 18 Encryption WW Over 13,000 solution “SC Recommended” reporting trillion 40,000 patches in our on 40m applications 3 years in a row $14 trillion new patch feed users controlled in assets malware • 2M+ security appliances protected samples shipped… and growing daily! Dell Identity daily analyzed Dell and Access Dell every day Management SonicWALL KACE 102m managed identities
14 Dell Connected Security provides protection today, while preparing for tomorrow
Collaboration Effective between Protect information Connected Security is security that… everywhere security and the business • Leverages contextual awareness & shared helps you intelligence • Delivers superior security results while realize your working with the business Efficient true business potential Work across the business
15
1. Dell case study: 7-Eleven; 2, Salesforce.com Talk to us Dell SonicWALL – Wesley Hwang
Dell SecureWorks
Philip Simpson Lee Evans
Alan Coburn
16 17