client security strategies to defeat advanced threats

19
Client security strategies to defeat advanced threats Chris Burchett, Executive Director Client Security Software Chad Skipper, Distinguished Security Engineer, CTO

Upload: dell-world

Post on 15-Apr-2017

386 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Client Security Strategies To Defeat Advanced Threats

Client security strategies to

defeat advanced threatsChris Burchett, Executive Director Client Security Software

Chad Skipper, Distinguished Security Engineer, CTO

Page 2: Client Security Strategies To Defeat Advanced Threats

Today’s presenters

Chris Burchett

Executive Director of Engineering,Client Security

Chad Skipper

Distinguished Engineer,Office of the CTO

Edima Elinewinga

Executive Director, United Nations Foundation

Page 3: Client Security Strategies To Defeat Advanced Threats

The number of advanced threats grows exponentially every single day.

Types of Modern Threats

Device Theft/loss

Advanced Persistent Threats

BIOS Security Attacks

End Users

Data Leakage

Page 4: Client Security Strategies To Defeat Advanced Threats

World’s biggest data breaches in the past 2 years

Page 5: Client Security Strategies To Defeat Advanced Threats

average amount paid following a security breach, up from $5.4M in 2013.3

the cost per lost or stolen record increased over the last year from $188 to $201.3

of all organizations admitted detecting an attack can take days, weeks or even months4

87% 1/2of organizations have experienced a security breach in the last 12 months.1

>75Mrecords have been compromised this year in approximately 568 breaches.2

of companies concerned about lack of control and security in the Cloud.5

73%$201 $5.9M

!

The Growing Importance of Data Security

Page 6: Client Security Strategies To Defeat Advanced Threats

Current market and political trends in security

Wassenaar

Arrangement

March

2015

June2015

July2015

August

2015What’s next?

OPM Data Breach

FBI Chief urges ‘robust debate’ on encryption

FTC can now sue companies who get hacked

Page 7: Client Security Strategies To Defeat Advanced Threats

5 customer challenges to securing company data

Difficult to protect data wherever end users take it

Solutions impede end user productivity

Difficult setup and deployment

Inadequate protection against malware

No centralized management or compliance reporting

Dell can help you overcome these obstacles

Page 8: Client Security Strategies To Defeat Advanced Threats

Dell’s Point of View

At Dell, we believe client security and compliance don’t have to be difficult or disruptive. Our client security solutions protect data wherever it goes without sacrificing IT or end user productivity.

8

Page 9: Client Security Strategies To Defeat Advanced Threats

Client solution strategies to defeat advanced threats

Endpoint Security Suite

Encryption

Threat Protection

Authentication

Next Generation

Firewall

Cloud

001100010110001

+ Protect+ Enable + Comply

Page 10: Client Security Strategies To Defeat Advanced Threats

Simplify endpoint protection with an integrated suite

Endpoint Security Suite

Encryption

Threat Protection

Authentication

Next Generation

Firewall

Cloud

001100010110001

+ Protect+ Enable + Comply

Dell Data Protection | Endpoint Security Suite

Use case:

Bank IT team needed an easier way to manage their endpoint security strategy and prove compliance…

Customer benefits:

• One trusted vendor for all of endpoint security needs

• Minimizes time and resources needed by enabling remote management using a single console

• Even smaller businesses can easily deploy and manage an endpoint security strategy

Page 11: Client Security Strategies To Defeat Advanced Threats

Secure data on any device with intelligent encryption

Endpoint Security Suite

Encryption

Threat Protection

Authentication

Next Generation

Firewall

Cloud

001100010110001

+ Protect+ Enable + Comply

Dell Data Protection | Encryption

Use Case

Healthcare employee loses a USB drive with sensitive customer information including social security numbers...

Customer benefits:

• No interference with employee productivity

• Easily set up compliance reporting to prove a lost or compromised device was encrypted

• Designed to work with existing IT processes

• Offered with Dell Commercial devices

Page 12: Client Security Strategies To Defeat Advanced Threats

Contain, identify and control both known and unknown threats

Endpoint Security Suite

Encryption

Threat Protection

Authentication

Next Generation

Firewall

Cloud

001100010110001

+ Protect+ Enable + Comply

Dell Data Protection | Protected Workspace

Use Case:

Even the most security savvy employees are prime targets of spear-phishing attacks…

Customer benefits:

• Stop known and unknown threats from reaching company data

• Restore a new environment in 20 seconds

• Significantly increase end user productivity

Page 13: Client Security Strategies To Defeat Advanced Threats

Ensure only those authorized get access

Endpoint Security Suite

Encryption

Threat Protection

Authentication

Next Generation

Firewall

Cloud

001100010110001

+ Protect+ Enable + Comply

Dell Data Protection | Security Tools

Identity and Access Management

Use Case:

Authenticate with customizable levels of access based on method…

Customer benefits:

• Support multifactor authentication like finger print readers and smart card readers

• Eliminate the complexities and time-consuming processes that are often required to govern identities, manage privileged accounts and control access

Page 14: Client Security Strategies To Defeat Advanced Threats

Secure remote access to corporate data and apps

Endpoint Security Suite

Encryption

Threat Protection

Authentication

Next Generation

Firewall

Cloud

001100010110001

+ Protect+ Enable + Comply

SonicWall’s Next Generation FirewallUse Case:

An employee needs access to a different set of apps at work and at home.

Customer benefits:

• Achieve a deep level of security with a single firewall appliance

• Real-time inspection enables you to visualize and control application traffic as it crosses the network

• Lower your total cost of ownership (TCO) with easy deployment, configuration and maintenance

Page 15: Client Security Strategies To Defeat Advanced Threats

Protect data in public clouds like Dropbox and Box

Endpoint Security Suite

Encryption

Threat Protection

Authentication

Next Generation

Firewall

Cloud

001100010110001

+ Protect+ Enable + Comply

Dell Data Protection | Cloud Edition

Use Case:

Marketing division of a company relies on public clouds like Dropbox to easily share large documents with partners and internal teams…

Customer benefits:

• IT can make end users happy by allowing them to securely work using their favorite apps

• One-click, secure sharing in the cloud

• Increased employee productivity with transparent encryption

Page 16: Client Security Strategies To Defeat Advanced Threats

Why Dell? Most Secure in the Industry

Only Dell Delivers a Centrally Managed Console

The most comprehensive encryption and authentication in one centrally managed console

Only Dell Delivers FIPS 140-2, Level 3

Highest level of protection commercially available with HCA

Only Dell Provides Security from Endpoint to the Cloud

Protects data on any device, external media, self-encrypting drives, and in the cloud

Only Dell Delivers the Broadest Range of Authentication Solutions

FIPS-certified finger print readers, contactless smart cards, smart cards

Only Dell Offers Advanced Malware Prevention

Prevents Advanced Persistent Threats (APTs) and zero-day attacks with our commercial PCs

Heterogeneous Solution

Works on Dell and non-Dell devices

Page 17: Client Security Strategies To Defeat Advanced Threats

United Nations Foundation

Challenge

• The UN foundation needed an endpoint security solution that enabled them to improve mobility and secure company data on their employees’ Latitude laptops

Results

• Fast implementation and flexible deployment on laptops

• Easy compliance reporting

• Peace of mind knowing sensitive data is safe

Edima Elinewinga

Executive Director

Page 18: Client Security Strategies To Defeat Advanced Threats

ResourcesBrowse:• dell.com/security• dell.com/datasecurity• powermore.dell.com

Watch:Dell Youtube Channel

Interact:@DellSecuritySecurity kiosks on the Dell World Expo Floor

Page 19: Client Security Strategies To Defeat Advanced Threats

Thanks!