Ubiquitous information protection: anywhere, any time, any device Jonathan Sander Director Product Strategy, Identity and Access Management Dell Software Group
Jan 20, 2015
Ubiquitous information protection:anywhere, any time, any deviceJonathan SanderDirector Product Strategy, Identity and Access ManagementDell Software Group
Ubiquitous information protection:anywhere, any time, any devicePatrick SweeneyExecutive Director of Network SecurityDell Software Group
Security is impacting the businesswhen it should enable the business
A major pain• Security is identified in the top 3 as
the single greatest obstacle to realizing the full benefits of IT
Complex issue• Threats are everywhere and
constantly changing• Many technology options to
mitigate threats
A more effective
and efficient way to
solve your challenges starts with
an understan
ding of how Dell leverages
our collective assets.
Business needs are not
adequately
addressed by
security solutions
Barrier to realizing full IT benefits
Top 3
Business can’t stop to wait for security
Desire: To embrace business trends
Challenge:Security often gets in the way
How often
have you stalled a project due to
security concerns
?
But it often does, or even bypasses it
Web 2.0 Virtualization Compliance
Cloud SaaS BYODData growth
Today, layers and silos get the security job done but often don’t support key initiatives
Dell belief: there is a better
waySilos and layers add stress to your resources• Difficult to get to work together• Limited security resources
Individual job done well in silos• Solutions often don’t work
together• Solutions don’t work across
the business
Dell’s vision for tomorrow is Connected Security
Connected Security is security that…• Works collectively together; shares
and applies intelligence• Works with the business, end-to-end• Maintains flexibility and modularity
yet is expansive & cohesive – open architecture
• Enables broad contextual awareness with dynamic control
Leverages contextual awareness and shared
intelligence to deliver superior security
Security to
enable business
while also
meeting the
needs of security
Protect information everywhere
Effective
Work with the business
Efficient
Dell’s approach to Connected Security is a comprehensive lifecycle approach • Embed security at time of
manufacturing • Provide active information
protection from device to the cloud
• Detect threats & mitigate risks with predictive intelligence
• Respond to breaches to quarantine and remediate immediately
Embed
Protect
Respond
Detect
Dell Connected Security begins with a foundation of best-in-class solutions
Easy to use, easy to deploy
Actionable, context-aware intelligence
Security expertise when needed
Security ServicesManaged Security ServicesCounter Threat Unit IntelligenceSecurity Consulting & Auditing
Dell Services
Network SecurityNext-generation FirewallEmail SecuritySecure Remote Access
Dell Software Group
Information & Identity ProtectionData encryptionIdentity & Access Management
Dell Software Group
Dell End User Computing
Dell Connected Security works with the business, end-to-end
Dell SecureWorks + Dell SonicWALL + other security
solutions
Provides improved insight & decision making – better together
Dell SonicWALL firewalls + Dell
identity & access management
Dell Business- In-A-Box
Security ServicesManaged Security ServicesCounter Threat Unit IntelligenceSecurity Consulting & Auditing
Dell Services
Network SecurityNext-generation FirewallEmail SecuritySecure Remote Access
Dell Software Group
Information & Identity ProtectionData encryptionIdentity & Access Management
Dell Software Group
Dell End User Computing
Providing ubiquitous information protection while enabling the business
Collaboration between
security and the business will produce
vast improvemen
ts
Protect information everywhere
Effective
Work across the business
Efficient
Connected Security is security that…
Leverages contextual awareness & shared
intelligence to deliver superior security results while working
with the business
Let’s get started
Engage with experts at the Expo• And visit www.Dell.com
Envision a solution with a Security Whiteboard Session after Dell World
Gain hands on experience/demos in the Solution Center
Confidential
On the Dell World app
Or
Contentstyleguidelines Session Evaluation Survey
On paper• Forms in room• Turn in on the way
out
4. Select survey title
5. Simply complete the survey
3. Select Surveys
1. Select My Schedule
2. Select session to evaluate
Please help Dell meet your needsby filling out the Session Evaluation Surveys
Embed Protect
Respond Predict & Detect