SlideShare uma empresa Scribd logo
1 de 18
MT54:
Better Security
is Better Business
Tom Ricoy, Director of Marketing, Data Security Solutions, Dell
Dell - Internal Use - Confidential2 of Y
Growing impact of failure
 $445 billion global cost of
cyber crime
 $3.8M average data breach
cost up 38%
 $254M 1H16 US
ransomware payments
Meeting worker expectations
 65% of employees sometimes
work at home
 78% employees in highly
regulated industries use free
cloud services
Better security is better business
Dell - Internal Use - Confidential3 of Y
But more difficult than ever
435,000 new
malware variants
produced daily
7 million phishing
campaigns monthly
Every 53
seconds a
laptop is lost
or stolen
1:22 average
time before
compromise
for phishing
campaign
205 days
elapsed time
between
compromise
and detection
95% of all data
breaches originate
at endpoint
77% of
organizations
say they
experienced a
compromise in
last 12 months
Three big
challenges
Data as the new currency,
needs to be protected from
threats, both internal and
external
Trade off between workforce
innovation and security
Too many vendors, consoles
agents; not efficient, not
secure
Dell - Internal Use - Confidential5 of Y
What should you do?
Define a cyber-security plan. Ensure it is aligned with your business
strategy and imperatives
Secure your endpoints. Conduct end user education. Embrace modern
techniques for end point security
Defense in depth. No silver bullet. Protect yourself with complement,
layered security.
Choose a strategic partner. Simplify and improve security through
integrated portfolio.
Dell - Internal Use - Confidential6 of Y
Converged data-centric security portfolio
Data Threat Identity Management
Data protected at
rest, in motion
and in use,
backed-up to
avoid data loss
Prevention,
detection and
remediation for
endpoints
Access to the
right person for
the right data at
the right time
Modern
management for
endpoints and
devices
Best-in-class solutions…
together
Dell - Internal Use - Confidential8 of Y
Endpoint Data Security and Management
 Dell Encryption
Data Threat Identity Management
 Dell Threat
Defense (SB)
 Dell Security
Tools
 Dell Command
Dell Endpoint Security Suite Enterprise
Dell - Internal Use - Confidential9 of Y
Endpoint Data Security and Management
 Dell Encryption
 Mozy Pro
 Mozy Enterprise
Data Threat Identity Management
 Dell Threat
Defense (SB)
 RSA NetWitness
Endpoint
 Dell Security
Tools
 RSA SecurID
Access
 Dell Command
 AirWatch Green
 AirWatch Blue
 AirWatch
ExpressDell Endpoint Security Suite Enterprise
Dell - Internal Use - Confidential10 of Y
Endpoint Data Security and Management
 Dell Encryption
 Mozy Pro
 Mozy Enterprise
Data Threat Identity Management
 Dell Threat
Defense (SB)
 RSA NetWitness
Endpoint
 Dell Security
Tools
 RSA SecurID
Access
 Dell Command
 AirWatch Green
 AirWatch Blue
 AirWatch
ExpressDell Endpoint Security Suite Enterprise
Dell - Internal Use - Confidential11 of Y
X`X`
AirWatch Blue, Green, and ExpressMozyPro and MozyEnterprise
 Leader in Gartner MQ
for EMM Suites for 6th
consecutive year
 Largest EMM vendor in
IDC Worldwide EMM
software market
 Leader in Forrester
Wave EMM Report
 “Top Player” in Radicati
EMM Market Quadrant
• Any device + any use
case + unified
management
• Modern management
framework
• Low TCO, simpler,
flexible
 75% of businesses are
not confident in their
ability to restore data
 $1,325 is the average
cost of a recovering
data on a hard drive
 $1,500 is the average
productivity loss of
estimate
• Cloud based sync, backup
and restore
• Continuous backup
• 90 days of version protection
• Protect against data
vulnerabilities due to user
error, hardware failure,
malware attack and natural
disaster
Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
Dell - Internal Use - Confidential12 of Y
X`X`
RSA NetWitness EndpointRSA SecurID Access
 70-90% of malware
samples are unique to
an organization
 390k new malware per
day
 Serving 200+ of the
Fortune 500
• Behavioral-based
detection of unique,
targeted and unknown
threats
• Respond in minutes,
not months
• Lightweight kernel-
level agent for
continuous endpoint
monitoring
 More than 25 years in
the market
 Gartner leader’s
quadrant
 55 million+ tokens
shipped
 Only 20% of a user
population use multi-
factor authentication
• Multi-factor authentication
• Combining something you
know + something you have
• Time based authentication so
continuous
Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
Dell - Internal Use - Confidential13 of Y
Taking steps towards a more secure tomorrow
Crawl: Joint GTM
1 2 3
• Single purchase
path
• Solution
interoperability
and validation
testing
• Solution bundles
targeting key
customer needs
• Dell ProSupport
for integrated
technical support
• Endpoint agents
and management
console integration
• Shared threat
information
• Lifecycle endpoint
recovery
Timing: 1H17 Timing: 2H17Timing: 2H16
Dell - Internal Use - Confidential14 of Y
Better together, stronger ahead
Common UI and workflow,
single console and
consolidated agent
Simplified management.
Superior security
Integrated Security
Provide insights for data,
security and user behavior
Better forensics and
improved security defenses
and user tools
Security Analytics
Efficient device management
and seamless restoration
Improved user uptime
and cost savings
Endpoint Management &
Resiliency
Strategic Focus Areas for Cross-Product Development
Solution built
to address
today’s security
environment
Transparent
protection of mobile,
collaborative end
users
Simplified,
integrated
inter-operability,
from one partner
Why Dell and why now?
Dell - Internal Use - Confidential16 of Y
Transforming security everywhere…
with our unique and unprecedented
combination of security and management
capabilities… simplified and converged
Visit demos at the Dell
EMC World Expo:
 Dell Endpoint Security
Suite Enterprise
 Mozy, RSA, and AirWatch
security solutions
Learn more at
DellSecurity.dell.com
Let’s talk
Dell - Internal Use - Confidential18 of Y

Mais conteúdo relacionado

Mais procurados

Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
Innovations in desktop virtualization: Expanding to workstation use cases
Innovations in desktop virtualization: Expanding to workstation use casesInnovations in desktop virtualization: Expanding to workstation use cases
Innovations in desktop virtualization: Expanding to workstation use casesDell World
 
DELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenterDELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenterMarketing Team
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDell EMC World
 
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...Dell EMC World
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforceDell World
 
MT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of ViewMT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of ViewDell EMC World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
MT101 Dell OCIO: Delivering data and analytics in real time
MT101 Dell OCIO:  Delivering data and analytics in real timeMT101 Dell OCIO:  Delivering data and analytics in real time
MT101 Dell OCIO: Delivering data and analytics in real timeDell EMC World
 
Your path to the cloud local event presentation
Your path to the cloud   local event presentationYour path to the cloud   local event presentation
Your path to the cloud local event presentationawrightKMBS
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyDell World
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...Dell EMC World
 
Dell EMC Future Ready Advantage
Dell EMC Future Ready AdvantageDell EMC Future Ready Advantage
Dell EMC Future Ready AdvantageJennifer Graham
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTMT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTDell EMC World
 
Prescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterprisePrescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterpriseDell World
 
Accelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at DellAccelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at DellDell World
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 

Mais procurados (20)

Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
Innovations in desktop virtualization: Expanding to workstation use cases
Innovations in desktop virtualization: Expanding to workstation use casesInnovations in desktop virtualization: Expanding to workstation use cases
Innovations in desktop virtualization: Expanding to workstation use cases
 
DELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenterDELL EMC: IT transformation & the impact on the datacenter
DELL EMC: IT transformation & the impact on the datacenter
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
David Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC WorldDavid Goulden keynote at Dell EMC World
David Goulden keynote at Dell EMC World
 
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...MT112 CHANNEL  You don't have to dance around Dell EMC channel services...an ...
MT112 CHANNEL You don't have to dance around Dell EMC channel services...an ...
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
MT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of ViewMT25 Server technology trends, workload impacts, and the Dell Point of View
MT25 Server technology trends, workload impacts, and the Dell Point of View
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
MT101 Dell OCIO: Delivering data and analytics in real time
MT101 Dell OCIO:  Delivering data and analytics in real timeMT101 Dell OCIO:  Delivering data and analytics in real time
MT101 Dell OCIO: Delivering data and analytics in real time
 
Your path to the cloud local event presentation
Your path to the cloud   local event presentationYour path to the cloud   local event presentation
Your path to the cloud local event presentation
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
 
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
 
Dell EMC Future Ready Advantage
Dell EMC Future Ready AdvantageDell EMC Future Ready Advantage
Dell EMC Future Ready Advantage
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoTMT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
 
Prescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterprisePrescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready Enterprise
 
Accelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at DellAccelerating IT Velocity: Agile Transformation at Dell
Accelerating IT Velocity: Agile Transformation at Dell
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 

Semelhante a MT54 Better security is better business

Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected securityMotty Ben Atia
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014Ronny Stavem
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionKenneth de Brucq
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breachesxband
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareRES
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewPriyanka Aash
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021lior mazor
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 

Semelhante a MT54 Better security is better business (20)

Dell sonicwall connected security
Dell sonicwall connected securityDell sonicwall connected security
Dell sonicwall connected security
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
Efficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in actionEfficiency, effectiveness, productivity: Dell Connected Security in action
Efficiency, effectiveness, productivity: Dell Connected Security in action
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 

Mais de Dell EMC World

MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...Dell EMC World
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...Dell EMC World
 
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...Dell EMC World
 
MT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionMT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionDell EMC World
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningDell EMC World
 
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires Dell EMC World
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached Dell EMC World
 
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected Dell EMC World
 
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planMT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planDell EMC World
 
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...Dell EMC World
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...Dell EMC World
 
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudMT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudDell EMC World
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionDell EMC World
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...Dell EMC World
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...Dell EMC World
 
MT129 Isilon Data Lake Overview
MT129 Isilon Data Lake OverviewMT129 Isilon Data Lake Overview
MT129 Isilon Data Lake OverviewDell EMC World
 
MT49 Dell EMC XtremIO: Product Overview and New Use Cases
MT49 Dell EMC XtremIO: Product Overview and New Use CasesMT49 Dell EMC XtremIO: Product Overview and New Use Cases
MT49 Dell EMC XtremIO: Product Overview and New Use CasesDell EMC World
 
MT46 Virtualization Integration with Unity
MT46 Virtualization Integration with UnityMT46 Virtualization Integration with Unity
MT46 Virtualization Integration with UnityDell EMC World
 
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...Dell EMC World
 

Mais de Dell EMC World (20)

MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
 
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
 
MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...MT88 - Assess your business risks by understanding your technology’s supply c...
MT88 - Assess your business risks by understanding your technology’s supply c...
 
MT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussionMT58 High performance graphics for VDI: A technical discussion
MT58 High performance graphics for VDI: A technical discussion
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
 
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected MT93 - Federal: End-point evolution: Mobile, secure, connected
MT93 - Federal: End-point evolution: Mobile, secure, connected
 
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization planMT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
 
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT13 - Keep your business processing operating at peak efficiency with Dell E...
 
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the CloudMT12 - SAP solutions from Dell – from your Datacenter to the Cloud
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
 
MT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoptionMT01 The business imperatives driving cloud adoption
MT01 The business imperatives driving cloud adoption
 
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
 
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
 
MT129 Isilon Data Lake Overview
MT129 Isilon Data Lake OverviewMT129 Isilon Data Lake Overview
MT129 Isilon Data Lake Overview
 
MT49 Dell EMC XtremIO: Product Overview and New Use Cases
MT49 Dell EMC XtremIO: Product Overview and New Use CasesMT49 Dell EMC XtremIO: Product Overview and New Use Cases
MT49 Dell EMC XtremIO: Product Overview and New Use Cases
 
MT46 Virtualization Integration with Unity
MT46 Virtualization Integration with UnityMT46 Virtualization Integration with Unity
MT46 Virtualization Integration with Unity
 
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
MT48 A Flash into the future of storage….  Flash meets Persistent Memory: The...
 

MT54 Better security is better business

  • 1. MT54: Better Security is Better Business Tom Ricoy, Director of Marketing, Data Security Solutions, Dell
  • 2. Dell - Internal Use - Confidential2 of Y Growing impact of failure  $445 billion global cost of cyber crime  $3.8M average data breach cost up 38%  $254M 1H16 US ransomware payments Meeting worker expectations  65% of employees sometimes work at home  78% employees in highly regulated industries use free cloud services Better security is better business
  • 3. Dell - Internal Use - Confidential3 of Y But more difficult than ever 435,000 new malware variants produced daily 7 million phishing campaigns monthly Every 53 seconds a laptop is lost or stolen 1:22 average time before compromise for phishing campaign 205 days elapsed time between compromise and detection 95% of all data breaches originate at endpoint 77% of organizations say they experienced a compromise in last 12 months
  • 4. Three big challenges Data as the new currency, needs to be protected from threats, both internal and external Trade off between workforce innovation and security Too many vendors, consoles agents; not efficient, not secure
  • 5. Dell - Internal Use - Confidential5 of Y What should you do? Define a cyber-security plan. Ensure it is aligned with your business strategy and imperatives Secure your endpoints. Conduct end user education. Embrace modern techniques for end point security Defense in depth. No silver bullet. Protect yourself with complement, layered security. Choose a strategic partner. Simplify and improve security through integrated portfolio.
  • 6. Dell - Internal Use - Confidential6 of Y Converged data-centric security portfolio Data Threat Identity Management Data protected at rest, in motion and in use, backed-up to avoid data loss Prevention, detection and remediation for endpoints Access to the right person for the right data at the right time Modern management for endpoints and devices
  • 8. Dell - Internal Use - Confidential8 of Y Endpoint Data Security and Management  Dell Encryption Data Threat Identity Management  Dell Threat Defense (SB)  Dell Security Tools  Dell Command Dell Endpoint Security Suite Enterprise
  • 9. Dell - Internal Use - Confidential9 of Y Endpoint Data Security and Management  Dell Encryption  Mozy Pro  Mozy Enterprise Data Threat Identity Management  Dell Threat Defense (SB)  RSA NetWitness Endpoint  Dell Security Tools  RSA SecurID Access  Dell Command  AirWatch Green  AirWatch Blue  AirWatch ExpressDell Endpoint Security Suite Enterprise
  • 10. Dell - Internal Use - Confidential10 of Y Endpoint Data Security and Management  Dell Encryption  Mozy Pro  Mozy Enterprise Data Threat Identity Management  Dell Threat Defense (SB)  RSA NetWitness Endpoint  Dell Security Tools  RSA SecurID Access  Dell Command  AirWatch Green  AirWatch Blue  AirWatch ExpressDell Endpoint Security Suite Enterprise
  • 11. Dell - Internal Use - Confidential11 of Y X`X` AirWatch Blue, Green, and ExpressMozyPro and MozyEnterprise  Leader in Gartner MQ for EMM Suites for 6th consecutive year  Largest EMM vendor in IDC Worldwide EMM software market  Leader in Forrester Wave EMM Report  “Top Player” in Radicati EMM Market Quadrant • Any device + any use case + unified management • Modern management framework • Low TCO, simpler, flexible  75% of businesses are not confident in their ability to restore data  $1,325 is the average cost of a recovering data on a hard drive  $1,500 is the average productivity loss of estimate • Cloud based sync, backup and restore • Continuous backup • 90 days of version protection • Protect against data vulnerabilities due to user error, hardware failure, malware attack and natural disaster Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
  • 12. Dell - Internal Use - Confidential12 of Y X`X` RSA NetWitness EndpointRSA SecurID Access  70-90% of malware samples are unique to an organization  390k new malware per day  Serving 200+ of the Fortune 500 • Behavioral-based detection of unique, targeted and unknown threats • Respond in minutes, not months • Lightweight kernel- level agent for continuous endpoint monitoring  More than 25 years in the market  Gartner leader’s quadrant  55 million+ tokens shipped  Only 20% of a user population use multi- factor authentication • Multi-factor authentication • Combining something you know + something you have • Time based authentication so continuous Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
  • 13. Dell - Internal Use - Confidential13 of Y Taking steps towards a more secure tomorrow Crawl: Joint GTM 1 2 3 • Single purchase path • Solution interoperability and validation testing • Solution bundles targeting key customer needs • Dell ProSupport for integrated technical support • Endpoint agents and management console integration • Shared threat information • Lifecycle endpoint recovery Timing: 1H17 Timing: 2H17Timing: 2H16
  • 14. Dell - Internal Use - Confidential14 of Y Better together, stronger ahead Common UI and workflow, single console and consolidated agent Simplified management. Superior security Integrated Security Provide insights for data, security and user behavior Better forensics and improved security defenses and user tools Security Analytics Efficient device management and seamless restoration Improved user uptime and cost savings Endpoint Management & Resiliency Strategic Focus Areas for Cross-Product Development
  • 15. Solution built to address today’s security environment Transparent protection of mobile, collaborative end users Simplified, integrated inter-operability, from one partner Why Dell and why now?
  • 16. Dell - Internal Use - Confidential16 of Y Transforming security everywhere… with our unique and unprecedented combination of security and management capabilities… simplified and converged
  • 17. Visit demos at the Dell EMC World Expo:  Dell Endpoint Security Suite Enterprise  Mozy, RSA, and AirWatch security solutions Learn more at DellSecurity.dell.com Let’s talk
  • 18. Dell - Internal Use - Confidential18 of Y