SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
MT50: Data is the New Currency. Protect it!
Steve Lalla, Sr. VP, Global Ops & End User Computing, Dell
Jeff McNaught, VP of Marketing, Cloud Client-Computing, Dell
Chris Burchett, VP, Cloud Client-Computing Customer Support, Dell
Dave Konetski, Fellow, EUC Technology Solutions, Dell
Dell Security Solutions for the New Age of Mobility
2
Work is happening everywhere… and continuing to evolve
Of employees
expect to be
working in a
smart office
within the next
5 years
57%
of employees
see home
technology as
more cutting
edge than
work
technology
35%
of employees
work remotely
at least a few
times per week
and value
balance of
productivity and
quality of life
52%
of Millennials are
more willing to
use AR/VR
products
77%
Of employees
say that remote
teams and better
collaboration
technology will
make F2F
communicatinos
obsolete
51%
3
The way we approach data security must change
1/2
of organizations
cite “risk of data
breach as the
biggest mobility
risk.
36%
cited the complexity
of using multiple
platforms and
devices.
28%
cited limited
technical/IT
resources as the
top barrier to
expanding mobile.
63%
of surveyed
organizations have had
one or more advanced
attacks during the past
12 months.
!
4
Why are businesses prioritizing data security?
average amount paid
following a security breach, up
from $5.4M in 2013.3
The average cost per lost or
stolen record increased 6%
from $145 the last year to $154.
As high as $217 in the US.
increase in records
compromised due to a
security breach since 2014.2
87% 210%
of organizations have
experienced a security breach
in the last 12 months.1
>175M
records have been
compromised this year in
approximately 591 breaches.2
New malware variants
produced daily in 2016.4
105K$154 $5.9M
!
5
Symptoms of an epidemic
435,000
1:22
77%
205 days




Existing solutions
are NOT
working
6
Why is security important for end users?
They bring their own apps
They bring their own devices and / or work
from uncontrolled locations
They create company data that’s mobile
They are targeted by hackers
7
Where are you?
Security–can your policies & solutions
meet today’s threat levels?
People – Have you matched roles to
devices and determined access levels?
Management – Will your current solutions
& policies be sufficient & cost effective?
Devices – Do you have a strategy to secure
devices that access corporate data?
8
So how do you balance?
End user demands Data protection
9
Dell Data Security Solutions point of view
Better security, better business. Dell Security
protects your organization from endpoint to
datacenter to cloud, helps you achieve your
most stringent compliance requirements,
and enables people to do more and thrive.
Secure your opportunity
11
Better security is better business
Protect data at-rest on endpoints and in the cloudEncryption
Prevent threats with machine-learning malware
fighting algorithms, ThinOS, and zero clients
Threat
Prevention
Restore data from lost, stolen, or damaged endpoints
Backup &
Recovery
Assure access with integrated authorization optionsAuthentication
Centralize and secure apps and data, managed in
the data center
Virtual
Transformational
security solutions
12
A suite idea for endpoint data security
.
.
75% of customers
prefer to purchase
integrated suitesTHREAT
PREVENTION
Stops threats within
16 milliseconds
DATA
PROTECTION
Encryption for all
your endpoints
HARDENED
AUTH
Range of integrated
authentication
options
SINGLE
Console,
workflow, client
agent
Physical endpoints
Virtual endpoints
13
Protect
FIPS 140-2
encryption for data
at-rest
High Efficacy:
99% threats prevented
versus current
industry avg. of 50%
Verified:
Only secure and
verified PC BIOS
Performance:
Minimal CPU usage 1%-
3% preserves system
performance
Endpoint Security Suite Enterprise
Best available Advanced Threat Prevention & Data Protection
14
Adding industry leading capabilities to the portfolio
X`
RSA SecurID Access
RSA NetWitness Endpoint
Vmware AirWatch
Blue, Green, Express
Mozy Pro &
Enterprise
Over 25 years in the market
Gartner leader’s quadrant
55 million+ tokens shipped
Multi-factor authentication
Something you know +
something you have
Time based
authentication
Industry leader for
Enterprise mobility
management suites
Any device + Any use case +
unified management
Low TCO, simpler, flexible
75% of businesses are not
confident in their ability to
restore data
Protection in public cloud
Multiple restore based options
Behavioral-based
Detection of Unique,
Targeted and Unknown
Threats
Respond in Minutes, not
Months
70-90% of malware
samples are unique to
an organization
15
Migrating Apps and Desktops to the Cloud
Protect Content
All apps and data safely
kept in the secure cloud or
datacenter which includes
auto-backup, DR, etc.
Enable secure mobility
Any device with appropriate
client SW agent can access
all desired apps and content
Control access
Set/enforce apps/data
access from stateless
thin and zero clients
Simplify desktop mgmt
Vastly simplify download,
upgrade, and patch
processes
Embrace BYOD
Allow personal device use
and mitigate security risks
with temps & contractors
Reduce energy usage
Compact, very low-power
endpoints can be sufficient
for most users
Cloud/
datacenter
hosted
apps &
desktops
16
Securely deliver nearly any desktop app to any user
on any device
Move your desktops to the cloud and:
Empower the workforce
Enable BYOD, deliver securely to any device, enhance user collaboration
Optimize IT resources
Reduce IT resources, scale and speed deployment
Improve security
Protect and control data, recover from disasters, apply policies, comply with
regulations, and monitor risk
Manage costs
Monitor and optimize total cost of ownership, achieve greater utilization from
infrastructure assets, reduce energy use
17
Secure by Data Center
design
• Centralized Windows apps and
associated data are managed and
protected in the data center.
• Policy-based access control and
multi-level security provides secure
appropriate user level access.
• Built-in data compliance – The
centralization of resources and strict
access control protect against data
loss and meet compliance and
privacy standards.
• ThinOS and zero client endpoints are
virus resistant with no attack surface.
• Advanced multi-factor authentication
with contactless smart cards.
• Ability to lock down device protects
against data theft and introduction of
malware to the network.
• Support for rigorous government
security compliance standards: FIPS
140-2, IPv6, NIST BIOS, and TPM
Ultimate end-point
security.
Product shown is the Wyse 3030 thin client
19
Data will move – protect it everywhere
Thumb drives
Companion devices
(tablets & smart
phones)
Public sync &
share clouds
Remote/
branch
Servers
Data centers
PC, Mac, Thin clients
Let’s talk
See demos at the Dell EMC World Expo
• Dell Appliance for Wyse - Citrix
• High Performance Virtual Graphics
• Wyse Thin and Zero Clients
• Dell Endpoint Security Suite Enterprise
• Mozy, RSA, and AirWatch security
solutions
Read the product websites and data
sheets for additional product details
Engage with our subject matter experts
to learn more
MT50 Data is the new currency: Protect it!

Más contenido relacionado

La actualidad más candente

Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
DELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenterDELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenterMarketing Team
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
Dell emc - The Changing IT Landscape
Dell emc - The Changing IT LandscapeDell emc - The Changing IT Landscape
Dell emc - The Changing IT LandscapeVITO - Securitas
 
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aardeSEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aardeTOPdesk
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioDell World
 
Accelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at DellAccelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at DellDell World
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesDell World
 
MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?Dell EMC World
 
Tekpros Solutions and Services
Tekpros Solutions and ServicesTekpros Solutions and Services
Tekpros Solutions and ServicesVamsiKrishna815
 
What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?Dell World
 
Prescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterprisePrescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterpriseDell World
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationJoe Reddix
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsePlus
 
Architecting the Enterprise Internet of Things
Architecting the Enterprise Internet of ThingsArchitecting the Enterprise Internet of Things
Architecting the Enterprise Internet of ThingsDell World
 
Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...
Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...
Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...Dell World
 
Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?Dell World
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...SolarWinds
 
Dell EMC Advantage
Dell EMC AdvantageDell EMC Advantage
Dell EMC Advantagegpadmanabh
 
Running SQL 2005? It’s time to migrate to SQL 2014!
Running SQL 2005? It’s time to migrate to SQL 2014!Running SQL 2005? It’s time to migrate to SQL 2014!
Running SQL 2005? It’s time to migrate to SQL 2014!Dell World
 

La actualidad más candente (20)

Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
DELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenterDELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenter
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
Dell emc - The Changing IT Landscape
Dell emc - The Changing IT LandscapeDell emc - The Changing IT Landscape
Dell emc - The Changing IT Landscape
 
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aardeSEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud Portfolio
 
Accelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at DellAccelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at Dell
 
Empowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspacesEmpowering the evolving workforce with virtual workspaces
Empowering the evolving workforce with virtual workspaces
 
MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?MT108 On the Edge of Eminence:When Will Services Transform the System?
MT108 On the Edge of Eminence:When Will Services Transform the System?
 
Tekpros Solutions and Services
Tekpros Solutions and ServicesTekpros Solutions and Services
Tekpros Solutions and Services
 
What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?What’s The Big Deal About Hadoop?
What’s The Big Deal About Hadoop?
 
Prescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterprisePrescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready Enterprise
 
Reddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - PresentationReddix Group - Quantum AI - Presentation
Reddix Group - Quantum AI - Presentation
 
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New HeightsNetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
 
Architecting the Enterprise Internet of Things
Architecting the Enterprise Internet of ThingsArchitecting the Enterprise Internet of Things
Architecting the Enterprise Internet of Things
 
Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...
Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...
Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...
 
Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?Are You Prepared For The Future Of Data Technologies?
Are You Prepared For The Future Of Data Technologies?
 
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
 
Dell EMC Advantage
Dell EMC AdvantageDell EMC Advantage
Dell EMC Advantage
 
Running SQL 2005? It’s time to migrate to SQL 2014!
Running SQL 2005? It’s time to migrate to SQL 2014!Running SQL 2005? It’s time to migrate to SQL 2014!
Running SQL 2005? It’s time to migrate to SQL 2014!
 

Destacado

Vito securitas - Luc Blyaert
Vito securitas - Luc BlyaertVito securitas - Luc Blyaert
Vito securitas - Luc BlyaertVITO - Securitas
 
The Transformation of your Data in modern IT (Presented by DellEMC)
The Transformation of your Data in modern IT (Presented by DellEMC)The Transformation of your Data in modern IT (Presented by DellEMC)
The Transformation of your Data in modern IT (Presented by DellEMC)Cloudera, Inc.
 
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudMT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudDell EMC World
 
The Path to Digital Transformation
The Path to Digital TransformationThe Path to Digital Transformation
The Path to Digital TransformationPrecisely
 
MT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysMT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysDell EMC World
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDell EMC World
 
Dell EMC Future Ready Advantage
Dell EMC Future Ready AdvantageDell EMC Future Ready Advantage
Dell EMC Future Ready AdvantageJennifer Graham
 

Destacado (7)

Vito securitas - Luc Blyaert
Vito securitas - Luc BlyaertVito securitas - Luc Blyaert
Vito securitas - Luc Blyaert
 
The Transformation of your Data in modern IT (Presented by DellEMC)
The Transformation of your Data in modern IT (Presented by DellEMC)The Transformation of your Data in modern IT (Presented by DellEMC)
The Transformation of your Data in modern IT (Presented by DellEMC)
 
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudMT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
 
The Path to Digital Transformation
The Path to Digital TransformationThe Path to Digital Transformation
The Path to Digital Transformation
 
MT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge GatewaysMT85 Challenges at the Edge: Dell Edge Gateways
MT85 Challenges at the Edge: Dell Edge Gateways
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
 
Dell EMC Future Ready Advantage
Dell EMC Future Ready AdvantageDell EMC Future Ready Advantage
Dell EMC Future Ready Advantage
 

Similar a MT50 Data is the new currency: Protect it!

Sweden dell security
Sweden dell securitySweden dell security
Sweden dell securityRonny Stavem
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityCitrix
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentationsolarisyourep
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point FinalBen Rothke
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfForgeahead Solutions
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Citrix
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breachesxband
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014Ronny Stavem
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityCitrix
 

Similar a MT50 Data is the new currency: Protect it! (20)

Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business ProductivityManage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]Mobile Workspaces Go Where You Go [Infographic]
Mobile Workspaces Go Where You Go [Infographic]
 
Cyberlink Deck
Cyberlink DeckCyberlink Deck
Cyberlink Deck
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business ProductivityManage Risk by Protecting the Apps and Data That Drive Business Productivity
Manage Risk by Protecting the Apps and Data That Drive Business Productivity
 

Más de Dell EMC World

MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...Dell EMC World
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...Dell EMC World
 
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...Dell EMC World
 
MT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionMT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionDell EMC World
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningDell EMC World
 
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires Dell EMC World
 
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected Dell EMC World
 
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planMT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planDell EMC World
 
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...Dell EMC World
 
MT101 Dell OCIO: Delivering data and analytics in real time
MT101 Dell OCIO:  Delivering data and analytics in real timeMT101 Dell OCIO:  Delivering data and analytics in real time
MT101 Dell OCIO: Delivering data and analytics in real timeDell EMC World
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...Dell EMC World
 
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTMT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTDell EMC World
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionDell EMC World
 
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreMt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreDell EMC World
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...Dell EMC World
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...Dell EMC World
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...Dell EMC World
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusDell EMC World
 
MT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of ViewMT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of ViewDell EMC World
 

Más de Dell EMC World (20)

MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
 
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...
 
MT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionMT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussion
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
 
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
 
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected
 
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planMT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
 
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
 
MT101 Dell OCIO: Delivering data and analytics in real time
MT101 Dell OCIO:  Delivering data and analytics in real timeMT101 Dell OCIO:  Delivering data and analytics in real time
MT101 Dell OCIO: Delivering data and analytics in real time
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...
 
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTMT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined DatacentreMt19 Integrated systems as a foundation of the Software Defined Datacentre
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
 
MT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the CampusMT16 Future-Ready Networking for the Campus
MT16 Future-Ready Networking for the Campus
 
MT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of ViewMT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of View
 

MT50 Data is the new currency: Protect it!

  • 1. MT50: Data is the New Currency. Protect it! Steve Lalla, Sr. VP, Global Ops & End User Computing, Dell Jeff McNaught, VP of Marketing, Cloud Client-Computing, Dell Chris Burchett, VP, Cloud Client-Computing Customer Support, Dell Dave Konetski, Fellow, EUC Technology Solutions, Dell Dell Security Solutions for the New Age of Mobility
  • 2. 2 Work is happening everywhere… and continuing to evolve Of employees expect to be working in a smart office within the next 5 years 57% of employees see home technology as more cutting edge than work technology 35% of employees work remotely at least a few times per week and value balance of productivity and quality of life 52% of Millennials are more willing to use AR/VR products 77% Of employees say that remote teams and better collaboration technology will make F2F communicatinos obsolete 51%
  • 3. 3 The way we approach data security must change 1/2 of organizations cite “risk of data breach as the biggest mobility risk. 36% cited the complexity of using multiple platforms and devices. 28% cited limited technical/IT resources as the top barrier to expanding mobile. 63% of surveyed organizations have had one or more advanced attacks during the past 12 months. !
  • 4. 4 Why are businesses prioritizing data security? average amount paid following a security breach, up from $5.4M in 2013.3 The average cost per lost or stolen record increased 6% from $145 the last year to $154. As high as $217 in the US. increase in records compromised due to a security breach since 2014.2 87% 210% of organizations have experienced a security breach in the last 12 months.1 >175M records have been compromised this year in approximately 591 breaches.2 New malware variants produced daily in 2016.4 105K$154 $5.9M !
  • 5. 5 Symptoms of an epidemic 435,000 1:22 77% 205 days     Existing solutions are NOT working
  • 6. 6 Why is security important for end users? They bring their own apps They bring their own devices and / or work from uncontrolled locations They create company data that’s mobile They are targeted by hackers
  • 7. 7 Where are you? Security–can your policies & solutions meet today’s threat levels? People – Have you matched roles to devices and determined access levels? Management – Will your current solutions & policies be sufficient & cost effective? Devices – Do you have a strategy to secure devices that access corporate data?
  • 8. 8 So how do you balance? End user demands Data protection
  • 9. 9 Dell Data Security Solutions point of view Better security, better business. Dell Security protects your organization from endpoint to datacenter to cloud, helps you achieve your most stringent compliance requirements, and enables people to do more and thrive.
  • 11. 11 Better security is better business Protect data at-rest on endpoints and in the cloudEncryption Prevent threats with machine-learning malware fighting algorithms, ThinOS, and zero clients Threat Prevention Restore data from lost, stolen, or damaged endpoints Backup & Recovery Assure access with integrated authorization optionsAuthentication Centralize and secure apps and data, managed in the data center Virtual Transformational security solutions
  • 12. 12 A suite idea for endpoint data security . . 75% of customers prefer to purchase integrated suitesTHREAT PREVENTION Stops threats within 16 milliseconds DATA PROTECTION Encryption for all your endpoints HARDENED AUTH Range of integrated authentication options SINGLE Console, workflow, client agent Physical endpoints Virtual endpoints
  • 13. 13 Protect FIPS 140-2 encryption for data at-rest High Efficacy: 99% threats prevented versus current industry avg. of 50% Verified: Only secure and verified PC BIOS Performance: Minimal CPU usage 1%- 3% preserves system performance Endpoint Security Suite Enterprise Best available Advanced Threat Prevention & Data Protection
  • 14. 14 Adding industry leading capabilities to the portfolio X` RSA SecurID Access RSA NetWitness Endpoint Vmware AirWatch Blue, Green, Express Mozy Pro & Enterprise Over 25 years in the market Gartner leader’s quadrant 55 million+ tokens shipped Multi-factor authentication Something you know + something you have Time based authentication Industry leader for Enterprise mobility management suites Any device + Any use case + unified management Low TCO, simpler, flexible 75% of businesses are not confident in their ability to restore data Protection in public cloud Multiple restore based options Behavioral-based Detection of Unique, Targeted and Unknown Threats Respond in Minutes, not Months 70-90% of malware samples are unique to an organization
  • 15. 15 Migrating Apps and Desktops to the Cloud Protect Content All apps and data safely kept in the secure cloud or datacenter which includes auto-backup, DR, etc. Enable secure mobility Any device with appropriate client SW agent can access all desired apps and content Control access Set/enforce apps/data access from stateless thin and zero clients Simplify desktop mgmt Vastly simplify download, upgrade, and patch processes Embrace BYOD Allow personal device use and mitigate security risks with temps & contractors Reduce energy usage Compact, very low-power endpoints can be sufficient for most users Cloud/ datacenter hosted apps & desktops
  • 16. 16 Securely deliver nearly any desktop app to any user on any device Move your desktops to the cloud and: Empower the workforce Enable BYOD, deliver securely to any device, enhance user collaboration Optimize IT resources Reduce IT resources, scale and speed deployment Improve security Protect and control data, recover from disasters, apply policies, comply with regulations, and monitor risk Manage costs Monitor and optimize total cost of ownership, achieve greater utilization from infrastructure assets, reduce energy use
  • 17. 17 Secure by Data Center design • Centralized Windows apps and associated data are managed and protected in the data center. • Policy-based access control and multi-level security provides secure appropriate user level access. • Built-in data compliance – The centralization of resources and strict access control protect against data loss and meet compliance and privacy standards.
  • 18. • ThinOS and zero client endpoints are virus resistant with no attack surface. • Advanced multi-factor authentication with contactless smart cards. • Ability to lock down device protects against data theft and introduction of malware to the network. • Support for rigorous government security compliance standards: FIPS 140-2, IPv6, NIST BIOS, and TPM Ultimate end-point security. Product shown is the Wyse 3030 thin client
  • 19. 19 Data will move – protect it everywhere Thumb drives Companion devices (tablets & smart phones) Public sync & share clouds Remote/ branch Servers Data centers PC, Mac, Thin clients
  • 20. Let’s talk See demos at the Dell EMC World Expo • Dell Appliance for Wyse - Citrix • High Performance Virtual Graphics • Wyse Thin and Zero Clients • Dell Endpoint Security Suite Enterprise • Mozy, RSA, and AirWatch security solutions Read the product websites and data sheets for additional product details Engage with our subject matter experts to learn more