Market trends are favorable to continue consolidation in the endpoint security and management space. In this session, learn how Dell's security and management portfolios will help you address critical vulnerabilities, and simplify management and deployment of the most secure endpoints for your business.
2. Dell - Internal Use - Confidential2 of Y
Growing impact of failure
$445 billion global cost of
cyber crime
$3.8M average data breach
cost up 38%
$254M 1H16 US
ransomware payments
Meeting worker expectations
65% of employees sometimes
work at home
78% employees in highly
regulated industries use free
cloud services
Better security is better business
3. Dell - Internal Use - Confidential3 of Y
But more difficult than ever
435,000 new
malware variants
produced daily
7 million phishing
campaigns monthly
Every 53
seconds a
laptop is lost
or stolen
1:22 average
time before
compromise
for phishing
campaign
205 days
elapsed time
between
compromise
and detection
95% of all data
breaches originate
at endpoint
77% of
organizations
say they
experienced a
compromise in
last 12 months
4. Three big
challenges
Data as the new currency,
needs to be protected from
threats, both internal and
external
Trade off between workforce
innovation and security
Too many vendors, consoles
agents; not efficient, not
secure
5. Dell - Internal Use - Confidential5 of Y
What should you do?
Define a cyber-security plan. Ensure it is aligned with your business
strategy and imperatives
Secure your endpoints. Conduct end user education. Embrace modern
techniques for end point security
Defense in depth. No silver bullet. Protect yourself with complement,
layered security.
Choose a strategic partner. Simplify and improve security through
integrated portfolio.
6. Dell - Internal Use - Confidential6 of Y
Converged data-centric security portfolio
Data Threat Identity Management
Data protected at
rest, in motion
and in use,
backed-up to
avoid data loss
Prevention,
detection and
remediation for
endpoints
Access to the
right person for
the right data at
the right time
Modern
management for
endpoints and
devices
8. Dell - Internal Use - Confidential8 of Y
Endpoint Data Security and Management
Dell Encryption
Data Threat Identity Management
Dell Threat
Defense (SB)
Dell Security
Tools
Dell Command
Dell Endpoint Security Suite Enterprise
9. Dell - Internal Use - Confidential9 of Y
Endpoint Data Security and Management
Dell Encryption
Mozy Pro
Mozy Enterprise
Data Threat Identity Management
Dell Threat
Defense (SB)
RSA NetWitness
Endpoint
Dell Security
Tools
RSA SecurID
Access
Dell Command
AirWatch Green
AirWatch Blue
AirWatch
ExpressDell Endpoint Security Suite Enterprise
10. Dell - Internal Use - Confidential10 of Y
Endpoint Data Security and Management
Dell Encryption
Mozy Pro
Mozy Enterprise
Data Threat Identity Management
Dell Threat
Defense (SB)
RSA NetWitness
Endpoint
Dell Security
Tools
RSA SecurID
Access
Dell Command
AirWatch Green
AirWatch Blue
AirWatch
ExpressDell Endpoint Security Suite Enterprise
11. Dell - Internal Use - Confidential11 of Y
X`X`
AirWatch Blue, Green, and ExpressMozyPro and MozyEnterprise
Leader in Gartner MQ
for EMM Suites for 6th
consecutive year
Largest EMM vendor in
IDC Worldwide EMM
software market
Leader in Forrester
Wave EMM Report
“Top Player” in Radicati
EMM Market Quadrant
• Any device + any use
case + unified
management
• Modern management
framework
• Low TCO, simpler,
flexible
75% of businesses are
not confident in their
ability to restore data
$1,325 is the average
cost of a recovering
data on a hard drive
$1,500 is the average
productivity loss of
estimate
• Cloud based sync, backup
and restore
• Continuous backup
• 90 days of version protection
• Protect against data
vulnerabilities due to user
error, hardware failure,
malware attack and natural
disaster
Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
12. Dell - Internal Use - Confidential12 of Y
X`X`
RSA NetWitness EndpointRSA SecurID Access
70-90% of malware
samples are unique to
an organization
390k new malware per
day
Serving 200+ of the
Fortune 500
• Behavioral-based
detection of unique,
targeted and unknown
threats
• Respond in minutes,
not months
• Lightweight kernel-
level agent for
continuous endpoint
monitoring
More than 25 years in
the market
Gartner leader’s
quadrant
55 million+ tokens
shipped
Only 20% of a user
population use multi-
factor authentication
• Multi-factor authentication
• Combining something you
know + something you have
• Time based authentication so
continuous
Adding best-in-class solutions to the portfolio…Adding best-in-class solutions to the portfolio
13. Dell - Internal Use - Confidential13 of Y
Taking steps towards a more secure tomorrow
Crawl: Joint GTM
1 2 3
• Single purchase
path
• Solution
interoperability
and validation
testing
• Solution bundles
targeting key
customer needs
• Dell ProSupport
for integrated
technical support
• Endpoint agents
and management
console integration
• Shared threat
information
• Lifecycle endpoint
recovery
Timing: 1H17 Timing: 2H17Timing: 2H16
14. Dell - Internal Use - Confidential14 of Y
Better together, stronger ahead
Common UI and workflow,
single console and
consolidated agent
Simplified management.
Superior security
Integrated Security
Provide insights for data,
security and user behavior
Better forensics and
improved security defenses
and user tools
Security Analytics
Efficient device management
and seamless restoration
Improved user uptime
and cost savings
Endpoint Management &
Resiliency
Strategic Focus Areas for Cross-Product Development
15. Solution built
to address
today’s security
environment
Transparent
protection of mobile,
collaborative end
users
Simplified,
integrated
inter-operability,
from one partner
Why Dell and why now?
16. Dell - Internal Use - Confidential16 of Y
Transforming security everywhere…
with our unique and unprecedented
combination of security and management
capabilities… simplified and converged
17. Visit demos at the Dell
EMC World Expo:
Dell Endpoint Security
Suite Enterprise
Mozy, RSA, and AirWatch
security solutions
Learn more at
DellSecurity.dell.com
Let’s talk