SlideShare a Scribd company logo
MT50: Data is the New Currency. Protect it!
Steve Lalla, Sr. VP, Global Ops & End User Computing, Dell
Jeff McNaught, VP of Marketing, Cloud Client-Computing, Dell
Chris Burchett, VP, Cloud Client-Computing Customer Support, Dell
Dave Konetski, Fellow, EUC Technology Solutions, Dell
Dell Security Solutions for the New Age of Mobility
2
Work is happening everywhere… and continuing to evolve
Of employees
expect to be
working in a
smart office
within the next
5 years
57%
of employees
see home
technology as
more cutting
edge than
work
technology
35%
of employees
work remotely
at least a few
times per week
and value
balance of
productivity and
quality of life
52%
of Millennials are
more willing to
use AR/VR
products
77%
Of employees
say that remote
teams and better
collaboration
technology will
make F2F
communicatinos
obsolete
51%
3
The way we approach data security must change
1/2
of organizations
cite “risk of data
breach as the
biggest mobility
risk.
36%
cited the complexity
of using multiple
platforms and
devices.
28%
cited limited
technical/IT
resources as the
top barrier to
expanding mobile.
63%
of surveyed
organizations have had
one or more advanced
attacks during the past
12 months.
!
4
Why are businesses prioritizing data security?
average amount paid
following a security breach, up
from $5.4M in 2013.3
The average cost per lost or
stolen record increased 6%
from $145 the last year to $154.
As high as $217 in the US.
increase in records
compromised due to a
security breach since 2014.2
87% 210%
of organizations have
experienced a security breach
in the last 12 months.1
>175M
records have been
compromised this year in
approximately 591 breaches.2
New malware variants
produced daily in 2016.4
105K$154 $5.9M
!
5
Symptoms of an epidemic
435,000
1:22
77%
205 days




Existing solutions
are NOT
working
6
Why is security important for end users?
They bring their own apps
They bring their own devices and / or work
from uncontrolled locations
They create company data that’s mobile
They are targeted by hackers
7
Where are you?
Security–can your policies & solutions
meet today’s threat levels?
People – Have you matched roles to
devices and determined access levels?
Management – Will your current solutions
& policies be sufficient & cost effective?
Devices – Do you have a strategy to secure
devices that access corporate data?
8
So how do you balance?
End user demands Data protection
9
Dell Data Security Solutions point of view
Better security, better business. Dell Security
protects your organization from endpoint to
datacenter to cloud, helps you achieve your
most stringent compliance requirements,
and enables people to do more and thrive.
Secure your opportunity
11
Better security is better business
Protect data at-rest on endpoints and in the cloudEncryption
Prevent threats with machine-learning malware
fighting algorithms, ThinOS, and zero clients
Threat
Prevention
Restore data from lost, stolen, or damaged endpoints
Backup &
Recovery
Assure access with integrated authorization optionsAuthentication
Centralize and secure apps and data, managed in
the data center
Virtual
Transformational
security solutions
12
A suite idea for endpoint data security
.
.
75% of customers
prefer to purchase
integrated suitesTHREAT
PREVENTION
Stops threats within
16 milliseconds
DATA
PROTECTION
Encryption for all
your endpoints
HARDENED
AUTH
Range of integrated
authentication
options
SINGLE
Console,
workflow, client
agent
Physical endpoints
Virtual endpoints
13
Protect
FIPS 140-2
encryption for data
at-rest
High Efficacy:
99% threats prevented
versus current
industry avg. of 50%
Verified:
Only secure and
verified PC BIOS
Performance:
Minimal CPU usage 1%-
3% preserves system
performance
Endpoint Security Suite Enterprise
Best available Advanced Threat Prevention & Data Protection
14
Adding industry leading capabilities to the portfolio
X`
RSA SecurID Access
RSA NetWitness Endpoint
Vmware AirWatch
Blue, Green, Express
Mozy Pro &
Enterprise
Over 25 years in the market
Gartner leader’s quadrant
55 million+ tokens shipped
Multi-factor authentication
Something you know +
something you have
Time based
authentication
Industry leader for
Enterprise mobility
management suites
Any device + Any use case +
unified management
Low TCO, simpler, flexible
75% of businesses are not
confident in their ability to
restore data
Protection in public cloud
Multiple restore based options
Behavioral-based
Detection of Unique,
Targeted and Unknown
Threats
Respond in Minutes, not
Months
70-90% of malware
samples are unique to
an organization
15
Migrating Apps and Desktops to the Cloud
Protect Content
All apps and data safely
kept in the secure cloud or
datacenter which includes
auto-backup, DR, etc.
Enable secure mobility
Any device with appropriate
client SW agent can access
all desired apps and content
Control access
Set/enforce apps/data
access from stateless
thin and zero clients
Simplify desktop mgmt
Vastly simplify download,
upgrade, and patch
processes
Embrace BYOD
Allow personal device use
and mitigate security risks
with temps & contractors
Reduce energy usage
Compact, very low-power
endpoints can be sufficient
for most users
Cloud/
datacenter
hosted
apps &
desktops
16
Securely deliver nearly any desktop app to any user
on any device
Move your desktops to the cloud and:
Empower the workforce
Enable BYOD, deliver securely to any device, enhance user collaboration
Optimize IT resources
Reduce IT resources, scale and speed deployment
Improve security
Protect and control data, recover from disasters, apply policies, comply with
regulations, and monitor risk
Manage costs
Monitor and optimize total cost of ownership, achieve greater utilization from
infrastructure assets, reduce energy use
17
Secure by Data Center
design
• Centralized Windows apps and
associated data are managed and
protected in the data center.
• Policy-based access control and
multi-level security provides secure
appropriate user level access.
• Built-in data compliance – The
centralization of resources and strict
access control protect against data
loss and meet compliance and
privacy standards.
• ThinOS and zero client endpoints are
virus resistant with no attack surface.
• Advanced multi-factor authentication
with contactless smart cards.
• Ability to lock down device protects
against data theft and introduction of
malware to the network.
• Support for rigorous government
security compliance standards: FIPS
140-2, IPv6, NIST BIOS, and TPM
Ultimate end-point
security.
Product shown is the Wyse 3030 thin client
19
Data will move – protect it everywhere
Thumb drives
Companion devices
(tablets & smart
phones)
Public sync &
share clouds
Remote/
branch
Servers
Data centers
PC, Mac, Thin clients
Let’s talk
See demos at the Dell EMC World Expo
• Dell Appliance for Wyse - Citrix
• High Performance Virtual Graphics
• Wyse Thin and Zero Clients
• Dell Endpoint Security Suite Enterprise
• Mozy, RSA, and AirWatch security
solutions
Read the product websites and data
sheets for additional product details
Engage with our subject matter experts
to learn more
MT50 Data is the new currency: Protect it!

More Related Content

PDF
MT54 Better security is better business
PDF
MT81 Keys to Successful Enterprise IoT Initiatives
PDF
MT155 Analytics and Cloud Native Apps – Your Business Game Changer
PDF
MT82 IoT Security Starts at Edge
PDF
MT30 Best practices for data lake adoption
PDF
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
PDF
Key Security Insights: Examining 2014 to predict emerging threats
PDF
Client solutions for the modern workforce
MT54 Better security is better business
MT81 Keys to Successful Enterprise IoT Initiatives
MT155 Analytics and Cloud Native Apps – Your Business Game Changer
MT82 IoT Security Starts at Edge
MT30 Best practices for data lake adoption
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
Key Security Insights: Examining 2014 to predict emerging threats
Client solutions for the modern workforce

What's hot (20)

PDF
Channel Partners: Lead with Dell Software Solutions
PPTX
DELL EMC: IT transformation & the impact on the datacenter
PDF
Focus on business, not backups
PDF
Dell emc - The Changing IT Landscape
PDF
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
PDF
Extensibility: The Key To Managing Your Entire Cloud Portfolio
PDF
Accelerating IT Velocity: Agile Transformation at Dell
PDF
Empowering the evolving workforce with virtual workspaces
PDF
MT108 On the Edge of Eminence:When Will Services Transform the System?
PDF
Tekpros Solutions and Services
PDF
What’s The Big Deal About Hadoop?
PDF
Prescriptive Cloud Services for the Future Ready Enterprise
PPSX
Reddix Group - Quantum AI - Presentation
PDF
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
PDF
Architecting the Enterprise Internet of Things
PDF
Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...
PDF
Are You Prepared For The Future Of Data Technologies?
PPTX
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
PPTX
Dell EMC Advantage
PDF
Running SQL 2005? It’s time to migrate to SQL 2014!
Channel Partners: Lead with Dell Software Solutions
DELL EMC: IT transformation & the impact on the datacenter
Focus on business, not backups
Dell emc - The Changing IT Landscape
SEE the Cloud: Hans Timmerman - De cloud daalt neer op aarde
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Accelerating IT Velocity: Agile Transformation at Dell
Empowering the evolving workforce with virtual workspaces
MT108 On the Edge of Eminence:When Will Services Transform the System?
Tekpros Solutions and Services
What’s The Big Deal About Hadoop?
Prescriptive Cloud Services for the Future Ready Enterprise
Reddix Group - Quantum AI - Presentation
NetScaler: One Device, Every Need Guiding Enterprise IT to New Heights
Architecting the Enterprise Internet of Things
Manage easier, deliver faster, innovate more - Top 10 facts on Dell Enterpris...
Are You Prepared For The Future Of Data Technologies?
Government Webinar: Low-Cost Log, Network Configuration, and IT Monitoring So...
Dell EMC Advantage
Running SQL 2005? It’s time to migrate to SQL 2014!
Ad

Viewers also liked (7)

PDF
Vito securitas - Luc Blyaert
PPTX
The Transformation of your Data in modern IT (Presented by DellEMC)
PDF
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
PDF
The Path to Digital Transformation
PDF
MT85 Challenges at the Edge: Dell Edge Gateways
PDF
David Goulden keynote at Dell EMC World
PPTX
Dell EMC Future Ready Advantage
Vito securitas - Luc Blyaert
The Transformation of your Data in modern IT (Presented by DellEMC)
MT12 - SAP solutions from Dell – from your Datacenter to the Cloud
The Path to Digital Transformation
MT85 Challenges at the Edge: Dell Edge Gateways
David Goulden keynote at Dell EMC World
Dell EMC Future Ready Advantage
Ad

Similar to MT50 Data is the new currency: Protect it! (20)

PDF
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
PDF
Client Security Strategies To Defeat Advanced Threats
PDF
Dell sonicwall connected security
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PPTX
La sécurité de l'emploi : protégez votre SI
PDF
Safeguard Your Business
PPTX
Protecting endpoints from targeted attacks
PDF
Windows 10: Windows 10 de ITPros a ITPros
PDF
Daniel Grabski | Microsofts cybersecurity story
PDF
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
PDF
Manage Risk By Protecting the Apps and Data Infographic
PPTX
The day when 3rd party security providers disappear into cloud bright talk se...
PDF
“8th National Biennial Conference on Medical Informatics 2012”
PPTX
Cyber Security Demistyified
PPTX
Sweden dell security
PPTX
Trend micro data protection
PDF
Turning the tables talk delivered at CCISDA conference
PPTX
Securing your digital world cybersecurity for sb es
PPTX
Securing your digital world - Cybersecurity for SBEs
PPT
dataProtection_p3.ppt
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Client Security Strategies To Defeat Advanced Threats
Dell sonicwall connected security
Where data security and value of data meet in the cloud brighttalk webinar ...
La sécurité de l'emploi : protégez votre SI
Safeguard Your Business
Protecting endpoints from targeted attacks
Windows 10: Windows 10 de ITPros a ITPros
Daniel Grabski | Microsofts cybersecurity story
Manage Risk By Protecting the Apps and Data That Drive Business Productivity
Manage Risk By Protecting the Apps and Data Infographic
The day when 3rd party security providers disappear into cloud bright talk se...
“8th National Biennial Conference on Medical Informatics 2012”
Cyber Security Demistyified
Sweden dell security
Trend micro data protection
Turning the tables talk delivered at CCISDA conference
Securing your digital world cybersecurity for sb es
Securing your digital world - Cybersecurity for SBEs
dataProtection_p3.ppt

More from Dell EMC World (20)

PDF
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
PDF
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
PDF
MT88 - Assess your business risks by understanding your technology’s supply c...
PDF
MT58 High performance graphics for VDI: A technical discussion
PDF
MT 70 The New Era of Incident Response Planning
PDF
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
PDF
MT93 - Federal: End-point evolution: Mobile, secure, connected
PDF
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
PDF
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
PDF
MT101 Dell OCIO: Delivering data and analytics in real time
PDF
MT17_Building Integrated and Secure Networks with limited IT Support
PDF
MT13 - Keep your business processing operating at peak efficiency with Dell E...
PDF
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
PDF
MT01 The business imperatives driving cloud adoption
PDF
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
PDF
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
PDF
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
PDF
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
PDF
MT16 Future-Ready Networking for the Campus
PDF
MT25 Server technology trends, workload impacts, and the Dell Point of View
MT135_Simplifying web-scale systems management with the Dell PowerEdge Embedd...
MT147_Thinking Windows 10? Think simple, scalable, and secure deployments wit...
MT88 - Assess your business risks by understanding your technology’s supply c...
MT58 High performance graphics for VDI: A technical discussion
MT 70 The New Era of Incident Response Planning
MT 69 Tripwire Defense: Advanced Endpoint Detection by a Thousand Tripwires
MT93 - Federal: End-point evolution: Mobile, secure, connected
MT92 - Federal: Budget? What budget? Build your dream IT modernization plan
MT87 How technology can reduce costs, minimize environmental impact, and maxi...
MT101 Dell OCIO: Delivering data and analytics in real time
MT17_Building Integrated and Secure Networks with limited IT Support
MT13 - Keep your business processing operating at peak efficiency with Dell E...
MT11 - Turn Science Fiction into Reality by Using SAP HANA to Make Sense of IoT
MT01 The business imperatives driving cloud adoption
Mt19 Integrated systems as a foundation of the Software Defined Datacentre
MT09 Using Dell’s HPC Cloud Solutions to maximize HPC utilization while reduc...
MT125 Virtustream Enterprise Cloud: Purpose Built to Run Mission Critical App...
MT126 Virtustream Storage Cloud: Hyperscale Cloud Object Storage Built for th...
MT16 Future-Ready Networking for the Campus
MT25 Server technology trends, workload impacts, and the Dell Point of View

MT50 Data is the new currency: Protect it!

  • 1. MT50: Data is the New Currency. Protect it! Steve Lalla, Sr. VP, Global Ops & End User Computing, Dell Jeff McNaught, VP of Marketing, Cloud Client-Computing, Dell Chris Burchett, VP, Cloud Client-Computing Customer Support, Dell Dave Konetski, Fellow, EUC Technology Solutions, Dell Dell Security Solutions for the New Age of Mobility
  • 2. 2 Work is happening everywhere… and continuing to evolve Of employees expect to be working in a smart office within the next 5 years 57% of employees see home technology as more cutting edge than work technology 35% of employees work remotely at least a few times per week and value balance of productivity and quality of life 52% of Millennials are more willing to use AR/VR products 77% Of employees say that remote teams and better collaboration technology will make F2F communicatinos obsolete 51%
  • 3. 3 The way we approach data security must change 1/2 of organizations cite “risk of data breach as the biggest mobility risk. 36% cited the complexity of using multiple platforms and devices. 28% cited limited technical/IT resources as the top barrier to expanding mobile. 63% of surveyed organizations have had one or more advanced attacks during the past 12 months. !
  • 4. 4 Why are businesses prioritizing data security? average amount paid following a security breach, up from $5.4M in 2013.3 The average cost per lost or stolen record increased 6% from $145 the last year to $154. As high as $217 in the US. increase in records compromised due to a security breach since 2014.2 87% 210% of organizations have experienced a security breach in the last 12 months.1 >175M records have been compromised this year in approximately 591 breaches.2 New malware variants produced daily in 2016.4 105K$154 $5.9M !
  • 5. 5 Symptoms of an epidemic 435,000 1:22 77% 205 days     Existing solutions are NOT working
  • 6. 6 Why is security important for end users? They bring their own apps They bring their own devices and / or work from uncontrolled locations They create company data that’s mobile They are targeted by hackers
  • 7. 7 Where are you? Security–can your policies & solutions meet today’s threat levels? People – Have you matched roles to devices and determined access levels? Management – Will your current solutions & policies be sufficient & cost effective? Devices – Do you have a strategy to secure devices that access corporate data?
  • 8. 8 So how do you balance? End user demands Data protection
  • 9. 9 Dell Data Security Solutions point of view Better security, better business. Dell Security protects your organization from endpoint to datacenter to cloud, helps you achieve your most stringent compliance requirements, and enables people to do more and thrive.
  • 11. 11 Better security is better business Protect data at-rest on endpoints and in the cloudEncryption Prevent threats with machine-learning malware fighting algorithms, ThinOS, and zero clients Threat Prevention Restore data from lost, stolen, or damaged endpoints Backup & Recovery Assure access with integrated authorization optionsAuthentication Centralize and secure apps and data, managed in the data center Virtual Transformational security solutions
  • 12. 12 A suite idea for endpoint data security . . 75% of customers prefer to purchase integrated suitesTHREAT PREVENTION Stops threats within 16 milliseconds DATA PROTECTION Encryption for all your endpoints HARDENED AUTH Range of integrated authentication options SINGLE Console, workflow, client agent Physical endpoints Virtual endpoints
  • 13. 13 Protect FIPS 140-2 encryption for data at-rest High Efficacy: 99% threats prevented versus current industry avg. of 50% Verified: Only secure and verified PC BIOS Performance: Minimal CPU usage 1%- 3% preserves system performance Endpoint Security Suite Enterprise Best available Advanced Threat Prevention & Data Protection
  • 14. 14 Adding industry leading capabilities to the portfolio X` RSA SecurID Access RSA NetWitness Endpoint Vmware AirWatch Blue, Green, Express Mozy Pro & Enterprise Over 25 years in the market Gartner leader’s quadrant 55 million+ tokens shipped Multi-factor authentication Something you know + something you have Time based authentication Industry leader for Enterprise mobility management suites Any device + Any use case + unified management Low TCO, simpler, flexible 75% of businesses are not confident in their ability to restore data Protection in public cloud Multiple restore based options Behavioral-based Detection of Unique, Targeted and Unknown Threats Respond in Minutes, not Months 70-90% of malware samples are unique to an organization
  • 15. 15 Migrating Apps and Desktops to the Cloud Protect Content All apps and data safely kept in the secure cloud or datacenter which includes auto-backup, DR, etc. Enable secure mobility Any device with appropriate client SW agent can access all desired apps and content Control access Set/enforce apps/data access from stateless thin and zero clients Simplify desktop mgmt Vastly simplify download, upgrade, and patch processes Embrace BYOD Allow personal device use and mitigate security risks with temps & contractors Reduce energy usage Compact, very low-power endpoints can be sufficient for most users Cloud/ datacenter hosted apps & desktops
  • 16. 16 Securely deliver nearly any desktop app to any user on any device Move your desktops to the cloud and: Empower the workforce Enable BYOD, deliver securely to any device, enhance user collaboration Optimize IT resources Reduce IT resources, scale and speed deployment Improve security Protect and control data, recover from disasters, apply policies, comply with regulations, and monitor risk Manage costs Monitor and optimize total cost of ownership, achieve greater utilization from infrastructure assets, reduce energy use
  • 17. 17 Secure by Data Center design • Centralized Windows apps and associated data are managed and protected in the data center. • Policy-based access control and multi-level security provides secure appropriate user level access. • Built-in data compliance – The centralization of resources and strict access control protect against data loss and meet compliance and privacy standards.
  • 18. • ThinOS and zero client endpoints are virus resistant with no attack surface. • Advanced multi-factor authentication with contactless smart cards. • Ability to lock down device protects against data theft and introduction of malware to the network. • Support for rigorous government security compliance standards: FIPS 140-2, IPv6, NIST BIOS, and TPM Ultimate end-point security. Product shown is the Wyse 3030 thin client
  • 19. 19 Data will move – protect it everywhere Thumb drives Companion devices (tablets & smart phones) Public sync & share clouds Remote/ branch Servers Data centers PC, Mac, Thin clients
  • 20. Let’s talk See demos at the Dell EMC World Expo • Dell Appliance for Wyse - Citrix • High Performance Virtual Graphics • Wyse Thin and Zero Clients • Dell Endpoint Security Suite Enterprise • Mozy, RSA, and AirWatch security solutions Read the product websites and data sheets for additional product details Engage with our subject matter experts to learn more