Date post: | 27-Jun-2015 |
Category: |
Business |
Upload: | dell-world |
View: | 210 times |
Download: | 0 times |
1 Dell World 2014
Achieve deeper network, mobile and email security with Dell Security solutions
John Gordineer, Director of Product Marketing Dell Security, November 2014
2 Dell World 2014
Have you seen these headlines?
3 Dell World 2014
Have you seen these headlines?
4 Dell World 2014
Have you seen these headlines?
5 Dell World 2014
Have you seen these headlines?
6 Dell World 2014
Have you seen these headlines?
7 Dell World 2014
In 2013, 89% of breaches were caused by intrusions or malware
8 Dell World 2014
69% of attacks are malware
80% of malware attacks in 2012 were redirects from legitimate sites
81% of respondents admit to shutting off security functionality to improve network performance
9 Dell World 2014
69% of attacks are malware
80% of malware attacks in 2012 were redirects from legitimate sites
81% of respondents admit to shutting off security functionality to improve network performance
80% of malware attacks in 2012 were redirects from legitimate sites
10 Dell World 2014
New malware samples discovered by researchers every day, according to Georgia Tech 100,000
$5.4M Average cost of a US data breach in
2013, according to Ponemon Institute research
Estimated cost to US businesses from data
breaches in 2011, says Online Trust Alliance
$6.5B
60%
7,000+ New vulnerabilities
annually tracked by the Dell Counter Threat Unit
New malware samples detected by Antivirus solutions, Cyveillance study
shows
19% Estimated number of
healthcare providers with 2 or more breaches in the
last two years
11 Dell World 2014
Application Chaos
Unimportant Apps Important Apps
12 Dell World 2014
According to NSS labs estimate, 50% of Internet traffic is now encrypted
13 Dell World 2014
Ransomware has emerged
14 Dell World 2014
Gartner predicts by 2017, half of employers will require employees to supply their own device for work purposes
15 Dell World 2014
The BYOD Challenge
Personal Business
Increased business risks:
• Corporate data loss
• Malware attack
• Personal data privacy compliance
16 Dell World 2014
SOURCE: Yankee Group, June 2012
Top five mobile threats
1. Data loss from lost stolen of decommissioned devices
2. Information stealing mobile malware
3. Data loss and data leakage through poorly written third party applications
4. Vulnerabilities within devices, OS design and third party applications
5. Insecure Wi-Fi network or rogue access point
17 Dell World 2014
Volume of spam per day in 2013
Number of unique phishing sites detected in March 2014
44,000
557 Attack on brands
in Q1 2014
20 million Unique malware threats in 2013
69 billion
Of all email that enters a typical corporation is bad
90%
18 Dell World 2014
Brands under attack
Dell World 2014
Solving the problems
20 Dell World 2014
Secure your network
21 Dell World 2014
Threats have evolved but firewalls & IPS have not
22 Dell World 2014
Next-generation firewall technology
1. Stateful Packet Inspection
2. Intrusion Prevention 3. Threat Prevention (virus, malware) 4. Application Control 5. SSL Decryption 6. User Identification
Stateful Packet Inspection
Deep Packet Inspection
23 Dell World 2014
Next-generation firewall (NGFW) Breaking the malware cycle
Compromised “Good” Site
Malware Hosting Site
Page Visit
Malware Request
Exploit
Malware
SS
L D
ec
ryp
tio
n
URL Filtering
Intrusion Prevention
Network Anti-Virus
Cloud Anti-Virus
Botnet Filtering
24 Dell World 2014
Overcoming application chaos…
demands advanced application intelligence…
focused on users, apps and content.
25 Dell World 2014
Application intelligence and control
Policy
Identify Categorize Control
? ?
? ?
? ?
? Visualization
26 Dell World 2014
Secure your mobile access
27 Dell World 2014
Mobile security– managed device
Network
28 Dell World 2014
Mobile security – personal device
Trusted User?
Trusted Device?
Trusted Mobile apps?
Trusted User
Trusted Device
Trusted Mobile apps
Authenticate user
Validate device ID and security posture
Enforce BYOD policy acceptance
Connect only authorized apps to VPN and resources
Network
29 Dell World 2014
Mobility Management and Security Solutions
EMM functions
Real-time reporting and alerts
User self-service
Secure access to corporate resources
Systems, device, app and content management
Endpoint management Secure Mobile Access
EMM
Container management
30 Dell World 2014
Secure your email
31 Dell World 2014
Email security – beyond anti-spam
Advanced Protection
Spam, Virus, Phishing Brand Protection Compliance &
Encryption
32 Dell World 2014
Advanced protection
Connection management rejects up to 80% of spam and other threats before filtering
Filtering removes remaining spam and delivers good email to the email server
33 Dell World 2014
The big five regulations – what’s common?
Encryption of data
34 Dell World 2014
Brand protection: who is sending emails on your behalf?
I need visibility
I can take action
I can align everything to the known and shrink the unknown
Known Servers
Unconfirmed sources
Threats and
unknown sources I have no idea
Dell World 2014
How Dell can help
36 Dell World 2014
36
Dell delivers best-in-class security solutions
Identity & Access Mgmt
Identity Governance
Privileged Mgmt
Access Mgmt
Compliance & IT Gov
Security Services
Incident Response
Managed Security Svcs
Security & Risk Consult
Threat Intelligence
Data/Endpoint
Encryption
Protected Workspace
Configuration & Patch
Management
Secure Cloud Client
Network
Next Gen Firewall
Secure Mobile Access
Email Security
37 Dell World 2014
Dell SonicWALL security portfolio Network security Secure mobile
access Email security
Products (appliances) Products (appliance, virtual appliance)
Products (appliance, virtual appliance, hosted, software)
Add-on security services and app
Add-on security services
Add-on security services
Policy and management Add-on application
Hosted Software
Virtual appliance
Virtual appliance
WAN Acceleration
Clean Wireless –SonicPoint N Series
38 Dell World 2014
Dell SonicWALL Next-Generation Firewalls
SuperMassive E10800 SuperMassive E10400
SMB/Campus/Branch
Enterprise, Data Center SuperMassive Series
TZ 215/W TZ 205/W TZ 105/W
SuperMassive 9600 SuperMassive 9400 SuperMassive 9200
TZ Series
NSA 4600 NSA 3600 NSA 2600
NSA 220/250M
NSA 6600 NSA 5600
NSA Series
39 Dell World 2014
Cutting-edge threat prevention
Botnet command and control traffic detection and blocking
Comprehensive signatures, server and client-side attacks
Denial of Service / Flood detection and prevention
Protocol abuse / anomaly based detection
Geographical IP monitoring and blocking
Sophisticated anti-evasion technology
SSL traffic inspection
Visualization and reporting
40 Dell World 2014
E-Class Secure Remote Access Appliances
Secure Remote Access Appliances
Dell SonicWALL Secure Mobile Access
SRA EX7000 SRA EX6000 Virtual Appliance SRA EX9000
Simple, policy-enforced per app
VPN access to corporate data and resources
without compromising
security
Secure mobile access for all users, devices, apps and resources
Spike License
Secure Virtual Assist
Advanced Reporting
Native Access Modules
Mobile Connect
End Point Control
SRA 1600 Virtual Appliance SRA 4600
Secure Virtual Access
Web App Firewall
Secure Virtual Assist
Spike License Mobile Connect
End Point Control
Secure Virtual Meeting
41 Dell World 2014
Dell SonicWALL Secure Mobile Access solution
• Only per app VPN solution that can support any mobile app or container without modification and support iOS, Mac OSX, Android and Kindle
Simplify per app VPN
• Mobile device policy enforcement and management Achieve BYOD
compliance
• Per app VPN access controls, mobile app and device integrity validation and user authentication Protect from threats
• Scalable, network-level access to more resources including web, client/server, hosted virtual desktop and back connect such as VoIP
Access more resources
Enable mobile worker productivity while protecting from threats
42 Dell World 2014
E-Class Email Security Series
Email Security Series
ESA ES8300 Virtual Appliance E-Class Software
ESA 4300/3300 Virtual Appliance Software
• Stops spam, viruses and phishing attacks
• Stops leaks of corporate and confidential information
• Flexibility for corporate control and user empowerment
• Easy-to-install and manage for a quick return on investment
• Powerful granular reporting
Dell SonicWALL Email Security
Hosted Email Security
Email Protection
Emil Anti-Virus
Emil Compliance
Email Protection
Emil Anti-Virus
Emil Compliance
43 Dell World 2014
Deployment platform choice to best meet infrastructure requirements
On
-pre
mise
s
Hosted Email Security
Comprehensive Anti-Spam Service (CASS)
Hardware
Windows software
Virtual appliance
44 Dell World 2014
Dell SonicWALL Email Security
Proven expertise, industry leading technology
Proven expertise • 10,000+ customer installations
• 2 million+ mailboxes protected
• Global deployments (14+ languages supported)
• Large customer installations with tens and thousands of mailboxes
• 24 x 7 on-line and phone support
Industry leading technology • Email Security patent leader
(14 approved, many pending)
• SC Magazine 5 star overall rating
Dell Software
Gartner Magic Quadrant • Unified Threat Management - Leader
• Secure Remote Access - Visionary
NSS Labs Security Value Maps • Next-Generation Firewall: Recommended (3 years in a row)
• Intrusion Prevention System: Recommended (2 years straight)
ICSA Labs • Enterprise Firewall Certification
• Next-Generation Firewall Evaluated
3rd party validation: Gartner, NSS Labs, ICSA Labs
46 Dell World 2014
The Dell difference. Better. Faster. Lower TCO.
• Demonstrated better security * than leading enterprise firewalls
• Tested fastest in the industry for detecting and dropping malware hidden in encrypted traffic
• Disruptively low TCO provided by a combination of low upfront cost and advanced centralized management tools
“Overall, in choosing Dell SonicWALL over Check Point, our cost-savings approximate $100,000.”
* 2014 NSS Labs NGFW Secure Value Map and Comparative Analysis
47 Dell World 2014
Snapshot • Public school district with 26,000
students and 4,800 teachers /staff • 21 elementary schools, six middle
schools and seven high schools
Challenge • District is tasked with securing on its network over 9,000
student and employee mobile devices at any one time.
Results • By deploying a Dell SonicWALL solution, district cuts costs by 50% • Students increase access to critical educational resources; teachers
can access other schools around the world • Mobile device users are authenticated, ensuring secure BYOD
Hall County Schools
Dell World 2014
48 Dell World 2014
“We increased our return on investment by using the Dell SonicWALL SRA 4600 with the Dell SonicWALL SuperMassive 9000 because we offload VPN traffic from our main firewall to the SRA. It took an engineer under an hour to set up a portal for vendors and a portal for employees, customizing each with Broncos themes.” Russ Trainor, VP of Technology, Denver Broncos
Denver Broncos
Dell World 2014
Dell World 2014
“When customers look at the Dell SSL VPN solution, they’ll know that it’s been developed to meet our manageability and scalability needs as a large enterprise. Very few other VPN vendors could meet these needs.” Alan Daines, Director of Security Engineering and Operations at Dell
Dell
Dell World 2014
Dell World 2014
Thank you.
Want to learn more about Dell’s security solutions?
Learn via email. Start here.
Sign me up!