client security strategies to defeat advanced threats
TRANSCRIPT
Client security strategies to
defeat advanced threatsChris Burchett, Executive Director Client Security Software
Chad Skipper, Distinguished Security Engineer, CTO
Today’s presenters
Chris Burchett
Executive Director of Engineering,Client Security
Chad Skipper
Distinguished Engineer,Office of the CTO
Edima Elinewinga
Executive Director, United Nations Foundation
The number of advanced threats grows exponentially every single day.
Types of Modern Threats
Device Theft/loss
Advanced Persistent Threats
BIOS Security Attacks
End Users
Data Leakage
World’s biggest data breaches in the past 2 years
average amount paid following a security breach, up from $5.4M in 2013.3
the cost per lost or stolen record increased over the last year from $188 to $201.3
of all organizations admitted detecting an attack can take days, weeks or even months4
87% 1/2of organizations have experienced a security breach in the last 12 months.1
>75Mrecords have been compromised this year in approximately 568 breaches.2
of companies concerned about lack of control and security in the Cloud.5
73%$201 $5.9M
!
The Growing Importance of Data Security
Current market and political trends in security
Wassenaar
Arrangement
March
2015
June2015
July2015
August
2015What’s next?
OPM Data Breach
FBI Chief urges ‘robust debate’ on encryption
FTC can now sue companies who get hacked
5 customer challenges to securing company data
Difficult to protect data wherever end users take it
Solutions impede end user productivity
Difficult setup and deployment
Inadequate protection against malware
No centralized management or compliance reporting
Dell can help you overcome these obstacles
Dell’s Point of View
At Dell, we believe client security and compliance don’t have to be difficult or disruptive. Our client security solutions protect data wherever it goes without sacrificing IT or end user productivity.
8
Client solution strategies to defeat advanced threats
Endpoint Security Suite
Encryption
Threat Protection
Authentication
Next Generation
Firewall
Cloud
001100010110001
+ Protect+ Enable + Comply
Simplify endpoint protection with an integrated suite
Endpoint Security Suite
Encryption
Threat Protection
Authentication
Next Generation
Firewall
Cloud
001100010110001
+ Protect+ Enable + Comply
Dell Data Protection | Endpoint Security Suite
Use case:
Bank IT team needed an easier way to manage their endpoint security strategy and prove compliance…
Customer benefits:
• One trusted vendor for all of endpoint security needs
• Minimizes time and resources needed by enabling remote management using a single console
• Even smaller businesses can easily deploy and manage an endpoint security strategy
Secure data on any device with intelligent encryption
Endpoint Security Suite
Encryption
Threat Protection
Authentication
Next Generation
Firewall
Cloud
001100010110001
+ Protect+ Enable + Comply
Dell Data Protection | Encryption
Use Case
Healthcare employee loses a USB drive with sensitive customer information including social security numbers...
Customer benefits:
• No interference with employee productivity
• Easily set up compliance reporting to prove a lost or compromised device was encrypted
• Designed to work with existing IT processes
• Offered with Dell Commercial devices
Contain, identify and control both known and unknown threats
Endpoint Security Suite
Encryption
Threat Protection
Authentication
Next Generation
Firewall
Cloud
001100010110001
+ Protect+ Enable + Comply
Dell Data Protection | Protected Workspace
Use Case:
Even the most security savvy employees are prime targets of spear-phishing attacks…
Customer benefits:
• Stop known and unknown threats from reaching company data
• Restore a new environment in 20 seconds
• Significantly increase end user productivity
Ensure only those authorized get access
Endpoint Security Suite
Encryption
Threat Protection
Authentication
Next Generation
Firewall
Cloud
001100010110001
+ Protect+ Enable + Comply
Dell Data Protection | Security Tools
Identity and Access Management
Use Case:
Authenticate with customizable levels of access based on method…
Customer benefits:
• Support multifactor authentication like finger print readers and smart card readers
• Eliminate the complexities and time-consuming processes that are often required to govern identities, manage privileged accounts and control access
Secure remote access to corporate data and apps
Endpoint Security Suite
Encryption
Threat Protection
Authentication
Next Generation
Firewall
Cloud
001100010110001
+ Protect+ Enable + Comply
SonicWall’s Next Generation FirewallUse Case:
An employee needs access to a different set of apps at work and at home.
Customer benefits:
• Achieve a deep level of security with a single firewall appliance
• Real-time inspection enables you to visualize and control application traffic as it crosses the network
• Lower your total cost of ownership (TCO) with easy deployment, configuration and maintenance
Protect data in public clouds like Dropbox and Box
Endpoint Security Suite
Encryption
Threat Protection
Authentication
Next Generation
Firewall
Cloud
001100010110001
+ Protect+ Enable + Comply
Dell Data Protection | Cloud Edition
Use Case:
Marketing division of a company relies on public clouds like Dropbox to easily share large documents with partners and internal teams…
Customer benefits:
• IT can make end users happy by allowing them to securely work using their favorite apps
• One-click, secure sharing in the cloud
• Increased employee productivity with transparent encryption
Why Dell? Most Secure in the Industry
Only Dell Delivers a Centrally Managed Console
The most comprehensive encryption and authentication in one centrally managed console
Only Dell Delivers FIPS 140-2, Level 3
Highest level of protection commercially available with HCA
Only Dell Provides Security from Endpoint to the Cloud
Protects data on any device, external media, self-encrypting drives, and in the cloud
Only Dell Delivers the Broadest Range of Authentication Solutions
FIPS-certified finger print readers, contactless smart cards, smart cards
Only Dell Offers Advanced Malware Prevention
Prevents Advanced Persistent Threats (APTs) and zero-day attacks with our commercial PCs
Heterogeneous Solution
Works on Dell and non-Dell devices
United Nations Foundation
Challenge
• The UN foundation needed an endpoint security solution that enabled them to improve mobility and secure company data on their employees’ Latitude laptops
Results
• Fast implementation and flexible deployment on laptops
• Easy compliance reporting
• Peace of mind knowing sensitive data is safe
Edima Elinewinga
Executive Director
ResourcesBrowse:• dell.com/security• dell.com/datasecurity• powermore.dell.com
Watch:Dell Youtube Channel
Interact:@DellSecuritySecurity kiosks on the Dell World Expo Floor
Thanks!