enabling mobility without compromising security

19
Dell World 2014 Enabling mobility without compromising security Roger Bjork, Sr. Product Manager Dell World 2014

Upload: dell-world

Post on 27-Jun-2015

110 views

Category:

Business


0 download

DESCRIPTION

If your organization is like most, then by 2016 only 37% of the mobile devices in your environment will be corporately owned or managed. How do you embrace this shift and move from a practice of limitation and restriction to a process of enablement and protection? See how Dell Security solutions—for secure mobile access, enterprise mobility management, identity and access management, and more—protect corporate data and assets, secure devices, networks and boundaries, and accelerate productivity and collaboration now and through the next generation of mobility.

TRANSCRIPT

Page 1: Enabling Mobility Without Compromising Security

1 Dell World 2014

Enabling mobility without compromising security

Roger Bjork, Sr. Product Manager

Dell World 2014

Page 2: Enabling Mobility Without Compromising Security

2 Dell World 2014

The opportunity and the challenge1

1/3 of employees exclusively use mobile devices to do their work

61% of respondents report that mobile devices have increased productivity

of organizations still have absolutely no security features in place to support mobility / security is inadequate

30%/74%

20,000->28,000 average number of mobile devices managed in large companies

52% security practices have been sacrificed to improve productivity

1. Ponemon Institute, Raytheon, 9/22/14: http://www.darkreading.com/operations/mobile-only-employee-trend-could-break-security-models/d/d-id/1315960?_mc=RSS_DR_EDT

$278 cost to manage devices securely

Page 3: Enabling Mobility Without Compromising Security

3 Dell World 2014

Controls?

Access?

Network?

Device?

Secure?

Compromised?

Jail broken?

Threats?

The real problem: We are focused on the wrong thing

Devices

Data

Page 4: Enabling Mobility Without Compromising Security

4 Dell World 2014

Five-step framework to securely enable mobility

Secure Mobile Strategy

Text Text

Text Text

Secure Access

• Provide access to the right resources

• Govern applications, data and privileged users

• Enable a secure, encrypted tunnel to corporate resources

Secure Data

• Encrypt & decrypt data

• Centralize & simplify management across multiple environments

• Set policies to wipe data

Secure Endpoint

• Securely manage endpoints & containers

• Manage and provision access

• Automate device discovery & inventory

• Create separate work environments

Secure Network

• Protect network & prevent intrusions

• Scale to offer protection without performance tradeoff

• Define mobile strategy and roadmap & training

• Establish response to threats

Page 5: Enabling Mobility Without Compromising Security

5 Dell World 2014

Secure mobile strategy Drives informed decisions through an established, repeatable process,

now and in the future

Understand Deeper dive

• Large enterprise

• Holistic view

• Deep dive in multiple target areas

• Customized Mobile device

audit

User productivity workflows

Mobile content management

Mobile device management

Page 6: Enabling Mobility Without Compromising Security

6 Dell World 2014

Secure identity

Provide business-driven access control and governance for users and privileged accounts

Control data and user access – not just the device.

provides secure access to resources, protects systems from direct exposure Foundation

Enforce policy Enhance security Provide unique user sessions Gain awareness

Page 7: Enabling Mobility Without Compromising Security

7 Dell World 2014

Secure mobile access Policy-enforced mobile access to mission-critical data and applications

without compromising security

Secure SSL VPN connection and granular network access controls

Context-aware authentication and device interrogation to restrict access to authorized users and trusted devices

One-click mobile access to authorized corporate applications and resources

Centralized access control policy management for efficient administration

Secure Mobile Access appliance

Mobile Connect app

8.1

Page 8: Enabling Mobility Without Compromising Security

8 Dell World 2014

Secure data

Comprehensive protection

Protect data on any device, external media and in the cloud with flexible options, including the highest level of FIPS 140-2 protection.

Deploy, enforce and audit compliance policies with pre-set compliance templates and policies.

Easier compliance

Save time with automatic deployment and provisioning, centralized management, and seamless integration with IT processes.

Simplified management

Enable end users to securely work anytime, anywhere, on any device without disruption.

End user productivity

Dell Data Protection Platform

Protect data from device to the cloud

Windows BitLocker SEDs Cloud

Windows or Mac Laptops / Desktops

Removable Media

Full Disk Encryption

Tablets and Smartphones

Page 9: Enabling Mobility Without Compromising Security

9 Dell World 2014

Secure network

Gateway protection, inspection for SSL encrypted sessions, and application

intelligence and control

Provide deeper network security for corporate data and protect from threats

• Automatically block attacks

• Automatically identify applications by their DNA

• Single sign-on to identify users

• Illuminate all application traffic on the network

• Control by application and user

Page 10: Enabling Mobility Without Compromising Security

10 Dell World 2014

Support devices, users, mobile strategy without the complexity

• Complete, secure endpoint management

• Secure enterprise workspace on all devices

• Secure access to enterprise data

• Integrated console management

• User self-service

• Identity management

• Business apps and services you need

• Flexibility for future-proofing

Secure endpoint

Comprehensive mobile enablement

Endpoint management Workspace management

Mobile Management

System Management

Mobile Workspace

Desktop Workspace

Page 11: Enabling Mobility Without Compromising Security

11 Dell World 2014

Five-step framework to securely enable mobility

Secure Mobile Strategy

Text Text

Text Text

Secure Access

• Provide access to the right resources

• Govern applications, data and privileged users

• Enable a secure, encrypted tunnel to corporate resources

Secure Data

• Encrypt & decrypt data

• Centralize & simplify management across multiple environments

• Set policies to wipe data

Secure Endpoint

• Securely manage endpoints & containers

• Manage and provision access

• Automate device discovery & inventory

• Create separate work environments

Secure Network

• Protect network & prevent intrusions

• Scale to offer protection without performance tradeoff

• Define mobile strategy and roadmap & training

• Establish response to threats Dell SecureWorks Mobile Security

Services & Solutions

Dell One Identity Solutions

Dell SonicWALL Secure Mobile Access

Dell Data Protection – Mobile Edition

Dell Enterprise Mobile Management

Dell KACE

Dell SonicWALL Next-Generation Firewalls

Page 12: Enabling Mobility Without Compromising Security

12 Dell World 2014

How Dell sees mobility done securely

100% cloud enabled, self-serviced

Rich user experience delivered as a single app on user’s device; private and secure

Single subscription charge for best-in-breed productivity services

Single point of integration into IT infrastructure (AD)

Secure workspace attributes include data leakage protection, secure remote access, identity management, encryption, and management functions

Voice & Messaging Dell Business Phone

File sync and share Box for Dell

Email, cal, contacts Microsoft Office 365

Corporate web apps Mobile Connect SMA

Secure workspace Dell Mobile Workspace

Mobile productivity

Reduce IT costs, simplify deployment complexity, provide faster employee time-to-productivity, deliver complete employee privacy and freedom

Page 13: Enabling Mobility Without Compromising Security

13 Dell World 2014

Snapshot • Public school district with

26,000 students and 4,800 teachers /staff

• 21 elementary schools, six middle schools and seven high schools

Challenge District is tasked with securing on its network over 9,000 student and employee mobile devices at any one time.

Results • By deploying a Dell SonicWALL solution, district cuts costs

by 50% • Students increase access to critical educational resources; teachers

can access other schools around the world • Mobile device users are authenticated, ensuring secure BYOD

Page 14: Enabling Mobility Without Compromising Security

14 Dell World 2014

The Dell difference: Security designed for a connected world

• Integrated, comprehensive portfolio secures from device to datacenter to cloud

• Shared intelligence across silos eliminates proprietary islands of information that create security gaps

• Considers the human factor to “keep the good guys good” without getting in the way of user productivity

Enable the enterprise to embrace

new technologies faster than the competition

Comply with regulations and achieve

consistent, reliable governance

Protect the whole enterprise –

outside in and inside out – efficiently and proactively

Page 15: Enabling Mobility Without Compromising Security

15 Dell World 2014

Dell delivers best-in class security solutions

Identity & Access Mgmt

Identity Governance

Privileged Mgmt

Access Mgmt

Compliance & IT Gov

Security Services

Incident Response

Managed Security Svcs

Security & Risk Consult

Threat Intelligence

Data/Endpoint

Encryption

Protected Workspace

Configuration & Patch

Management

Secure Cloud Client

Network

Next Gen Firewall

Secure Mobile Access

Email Security

Page 16: Enabling Mobility Without Compromising Security

16 Dell World 2014

Dell Security leadership, scale and recognition

Validated by the industry • #1 ranked company in Security

500 • NSS Labs “Recommended”

Firewall & IPS – 3 years in row • Overall Leader in Access

Governance, Kuppinger Cole • Best Security Service, Cloud

Security, Compliance, Info Security Products Guide

• Recommended by SC Magazine • Major Player, Email Security, IDC • 6 Gartner Magic Quadrants

76B cyber events

analyzed daily

2m devices WW

reporting on 40m users

5.9B security events of

interest daily

Dell SecureWorks

$14 trillion in assets

protected daily

1.06 trillion IPS

incidents detected &

blocked

5,000 security

incidents escalated

daily

1.78 billion malware

downloads blocked

Dell SonicWALL

Dell Data Protection Encryption

Data encrypted

and protected on 7m devices

Dell Identity and Access

Management 110m

managed identities

2,000+ security

professionals worldwide

Page 17: Enabling Mobility Without Compromising Security

17 Dell World 2014

Next steps

Visit the Security deep dive area, or the Protect lane in the Solutions Expo to see a demo

Attend other Security sessions: • MT23: Data Protection for

Data Everywhere: Utilizing Context-Aware Security Controls

• MT25: Overcoming Compliance Challenges: A 5-Step Path to Governance

Dig in at the Hands on Lab

Page 18: Enabling Mobility Without Compromising Security

Dell World 2014

Thank you.