Data is meant to roam, and contrary to popular opinion, better security is better business. But endpoints and users remain the key vulnerability to even the most robust security programs. In fact, 95% of all breaches occur at the endpoint, and organizations can still be susceptible to the latest viruses and malware. In this session you will learn how to protect your data on digital and physical workstations throughout the organization, wherever employees use it – at home, on the road, collaborating with partners, and more.
Learn more at Dell.com/datasecurity
MT25 Server technology trends, workload impacts, and the Dell Point of View
MT50 Data is the new currency: Protect it!
1. MT50: Data is the New Currency. Protect it!
Steve Lalla, Sr. VP, Global Ops & End User Computing, Dell
Jeff McNaught, VP of Marketing, Cloud Client-Computing, Dell
Chris Burchett, VP, Cloud Client-Computing Customer Support, Dell
Dave Konetski, Fellow, EUC Technology Solutions, Dell
Dell Security Solutions for the New Age of Mobility
2. 2
Work is happening everywhere… and continuing to evolve
Of employees
expect to be
working in a
smart office
within the next
5 years
57%
of employees
see home
technology as
more cutting
edge than
work
technology
35%
of employees
work remotely
at least a few
times per week
and value
balance of
productivity and
quality of life
52%
of Millennials are
more willing to
use AR/VR
products
77%
Of employees
say that remote
teams and better
collaboration
technology will
make F2F
communicatinos
obsolete
51%
3. 3
The way we approach data security must change
1/2
of organizations
cite “risk of data
breach as the
biggest mobility
risk.
36%
cited the complexity
of using multiple
platforms and
devices.
28%
cited limited
technical/IT
resources as the
top barrier to
expanding mobile.
63%
of surveyed
organizations have had
one or more advanced
attacks during the past
12 months.
!
4. 4
Why are businesses prioritizing data security?
average amount paid
following a security breach, up
from $5.4M in 2013.3
The average cost per lost or
stolen record increased 6%
from $145 the last year to $154.
As high as $217 in the US.
increase in records
compromised due to a
security breach since 2014.2
87% 210%
of organizations have
experienced a security breach
in the last 12 months.1
>175M
records have been
compromised this year in
approximately 591 breaches.2
New malware variants
produced daily in 2016.4
105K$154 $5.9M
!
5. 5
Symptoms of an epidemic
435,000
1:22
77%
205 days
Existing solutions
are NOT
working
6. 6
Why is security important for end users?
They bring their own apps
They bring their own devices and / or work
from uncontrolled locations
They create company data that’s mobile
They are targeted by hackers
7. 7
Where are you?
Security–can your policies & solutions
meet today’s threat levels?
People – Have you matched roles to
devices and determined access levels?
Management – Will your current solutions
& policies be sufficient & cost effective?
Devices – Do you have a strategy to secure
devices that access corporate data?
8. 8
So how do you balance?
End user demands Data protection
9. 9
Dell Data Security Solutions point of view
Better security, better business. Dell Security
protects your organization from endpoint to
datacenter to cloud, helps you achieve your
most stringent compliance requirements,
and enables people to do more and thrive.
11. 11
Better security is better business
Protect data at-rest on endpoints and in the cloudEncryption
Prevent threats with machine-learning malware
fighting algorithms, ThinOS, and zero clients
Threat
Prevention
Restore data from lost, stolen, or damaged endpoints
Backup &
Recovery
Assure access with integrated authorization optionsAuthentication
Centralize and secure apps and data, managed in
the data center
Virtual
Transformational
security solutions
12. 12
A suite idea for endpoint data security
.
.
75% of customers
prefer to purchase
integrated suitesTHREAT
PREVENTION
Stops threats within
16 milliseconds
DATA
PROTECTION
Encryption for all
your endpoints
HARDENED
AUTH
Range of integrated
authentication
options
SINGLE
Console,
workflow, client
agent
Physical endpoints
Virtual endpoints
13. 13
Protect
FIPS 140-2
encryption for data
at-rest
High Efficacy:
99% threats prevented
versus current
industry avg. of 50%
Verified:
Only secure and
verified PC BIOS
Performance:
Minimal CPU usage 1%-
3% preserves system
performance
Endpoint Security Suite Enterprise
Best available Advanced Threat Prevention & Data Protection
14. 14
Adding industry leading capabilities to the portfolio
X`
RSA SecurID Access
RSA NetWitness Endpoint
Vmware AirWatch
Blue, Green, Express
Mozy Pro &
Enterprise
Over 25 years in the market
Gartner leader’s quadrant
55 million+ tokens shipped
Multi-factor authentication
Something you know +
something you have
Time based
authentication
Industry leader for
Enterprise mobility
management suites
Any device + Any use case +
unified management
Low TCO, simpler, flexible
75% of businesses are not
confident in their ability to
restore data
Protection in public cloud
Multiple restore based options
Behavioral-based
Detection of Unique,
Targeted and Unknown
Threats
Respond in Minutes, not
Months
70-90% of malware
samples are unique to
an organization
15. 15
Migrating Apps and Desktops to the Cloud
Protect Content
All apps and data safely
kept in the secure cloud or
datacenter which includes
auto-backup, DR, etc.
Enable secure mobility
Any device with appropriate
client SW agent can access
all desired apps and content
Control access
Set/enforce apps/data
access from stateless
thin and zero clients
Simplify desktop mgmt
Vastly simplify download,
upgrade, and patch
processes
Embrace BYOD
Allow personal device use
and mitigate security risks
with temps & contractors
Reduce energy usage
Compact, very low-power
endpoints can be sufficient
for most users
Cloud/
datacenter
hosted
apps &
desktops
16. 16
Securely deliver nearly any desktop app to any user
on any device
Move your desktops to the cloud and:
Empower the workforce
Enable BYOD, deliver securely to any device, enhance user collaboration
Optimize IT resources
Reduce IT resources, scale and speed deployment
Improve security
Protect and control data, recover from disasters, apply policies, comply with
regulations, and monitor risk
Manage costs
Monitor and optimize total cost of ownership, achieve greater utilization from
infrastructure assets, reduce energy use
17. 17
Secure by Data Center
design
• Centralized Windows apps and
associated data are managed and
protected in the data center.
• Policy-based access control and
multi-level security provides secure
appropriate user level access.
• Built-in data compliance – The
centralization of resources and strict
access control protect against data
loss and meet compliance and
privacy standards.
18. • ThinOS and zero client endpoints are
virus resistant with no attack surface.
• Advanced multi-factor authentication
with contactless smart cards.
• Ability to lock down device protects
against data theft and introduction of
malware to the network.
• Support for rigorous government
security compliance standards: FIPS
140-2, IPv6, NIST BIOS, and TPM
Ultimate end-point
security.
Product shown is the Wyse 3030 thin client
19. 19
Data will move – protect it everywhere
Thumb drives
Companion devices
(tablets & smart
phones)
Public sync &
share clouds
Remote/
branch
Servers
Data centers
PC, Mac, Thin clients
20. Let’s talk
See demos at the Dell EMC World Expo
• Dell Appliance for Wyse - Citrix
• High Performance Virtual Graphics
• Wyse Thin and Zero Clients
• Dell Endpoint Security Suite Enterprise
• Mozy, RSA, and AirWatch security
solutions
Read the product websites and data
sheets for additional product details
Engage with our subject matter experts
to learn more