dell solutions tour 2015 - security in the cloud, ramses gallego, security strategist, dell software

30
Security in the Cloud Ramsés Gallego CISM, CGEIT, CISSP, CCSK, SCPM, ITIL., COBIT, Six Sigma Black Belt Security Strategist & Evangelist, Dell Software Immediate International Vice President, ISACA, Board of Directors President, ISACA, Barcelona Chapter Privacy by Design Ambassador, Government of Ontario, Canada

Upload: kenneth-de-brucq

Post on 14-Jan-2017

522 views

Category:

Software


0 download

TRANSCRIPT

Security in the Cloud

Ramsés Gallego CISM, CGEIT, CISSP, CCSK, SCPM, ITIL., COBIT, Six Sigma Black Belt

Security Strategist & Evangelist, Dell Software

Immediate International Vice President, ISACA, Board of Directors

President, ISACA, Barcelona Chapter

Privacy by Design Ambassador, Government of Ontario, Canada

3

4

Control Visibility

Effectiveness Efficiency

Automation Cost Management

Compliance Accountability Transparency

7

Current approaches to security are siloed, creating risk and impeding innovation.

Fragmented

Intrusive Reactive

Dell - Restricted - Confidential

Unfortunately, the bad guys are more connected

They have many names

Spear-Phishers, BOTnets, DDoS, Zero-Day Threats, Insider threats & former employees

They’re determined to exploit

“disconnected security” Security tools, processes, user profiles and information,

separated in siloes that leave dangerous gaps in-between

10

Dell delivers a better way, with security that works together across your whole business.

Holistic

Transparent

Proactive

Manage operational and business risk

Manage risk

• Compliance • Asset protection • Business continuity

Improved CAPEX and OPEX

management

Manage cost

• Resource optimization

• Process automation

Align IT investments with business goals

Align IT investments

• IT Portfolio management

• Value management • Business process management

Optimal value through effective and efficient

services

Improve service

• Service availability • Service Management

We are in the business of

ENTERPRISE RISK MANAGEMENT…

…through technology

The result: Better Security for a Better Business

Enable the enterprise to

embrace new technologies faster

than the competition

Comply with regulations

and achieve consistent,

reliable governance

Protect the whole enterprise

– outside in and inside out –

efficiently and proactively

Delivering best-in-class security solutions

Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov

Security Services Incident Response Managed Security Svcs Security & Risk Consult Threat Intelligence

Data/Endpoint

Encryption Protected Workspace

Configuration & Patch Management

Secure Cloud Client

Network

Next Gen Firewall Secure Mobile Access

Email Security

A holistic vision

‘A vision without execution is a hallucination’

Thomas Edison, 1847-1931

18

Let

go

od

gu

ys

in

Ke

ep

bad

gu

ys

ou

t

Sec

uri

ty

Serv

ice

s In

fras

tru

ctu

re &

D

evi

ce

s

Scalable and Mid-Market design point: endpoint to data center to cloud

Application Security

Network Security

Data Security

Dell Email Security

Dell Endpoint

Management

Dell SSL VPN

Dell Next-Gen Firewall

Dell Data Protection Encryption

Dell Protected

Workspace

Dell AppAssure

Endpoint Network Server Storage Cloud

Dell Managed Security Services

Dell Security & Risk

Consulting

Dell Threat Intelligence

Dell Incident

Response

Dell Wyse

Dell Identity & Access

Management

Dell Security Tools

19

Security leadership, scale and recognition

Validated by the industry •  #1 ranked company in Security 500 •  “Recommended” by NSS Labs for

Firewall & IPS – 3 years in row •  Overall Leader in Access

Governance, Kuppinger Cole •  Best Security Service, Cloud

Security, Compliance, Info Security Products Guide

•  Recommended by SC Magazine •  Major Player, Email Security, IDC •  6 Gartner Magic Quadrants

60B+ security events

analyzed daily

2M devices WW

reporting on 40m users

Detects 3B security

events of interest daily

Dell SecureWorks

$14 Trillion in assets

protected daily

15,000 malicious

events analyzed

daily

3,000 security

incidents escalated

daily

Over 18 Trillion

applications controlled

Dell SonicWALL

Dell Data Protection Encryption

Data encrypted & protected on 7M devices

Dell Identity and Access

Management 110M

managed identities

2,000+ security

professionals worldwide

22

23

24

Today - meet with Dell Security subject matter experts in the expo

Complete your solutions showcase evaluations

Schedule a post-event Whiteboard session to address your specific requirements. Contact your account team for details

Learn more by attending future events and workshops. Search www.dell.com/events for upcoming events in your area.

Next Steps

Dell Connected Security Better connected means better protected

#DellST15

28

Sir Isaac Newton, 1642-1727

29

‘If I have seen further it is by standing on the

shoulders of giants’

THANK YOU Ramsés Gallego CISM, CGEIT, CISSP, SCPM, CCSK, ITIL, COBIT(f), Six Sigma Black Belt Security Strategist & Evangelist, Dell Software [email protected] Immediate International Vice President, ISACA, Board of Directors President, ISACA, Barcelona Chapter Privacy by Design Ambassador, Government of Ontario, Canada