+ All Categories
Home > Software > Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security Strategist, Dell Software

Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security Strategist, Dell Software

Date post: 14-Jan-2017
Category:
Upload: kenneth-de-brucq
View: 522 times
Download: 0 times
Share this document with a friend
30
Security in the Cloud Ramsés Gallego CISM, CGEIT, CISSP, CCSK, SCPM, ITIL., COBIT, Six Sigma Black Belt Security Strategist & Evangelist, Dell Software Immediate International Vice President, ISACA, Board of Directors President, ISACA, Barcelona Chapter Privacy by Design Ambassador, Government of Ontario, Canada
Transcript

Security in the Cloud

Ramsés Gallego CISM, CGEIT, CISSP, CCSK, SCPM, ITIL., COBIT, Six Sigma Black Belt

Security Strategist & Evangelist, Dell Software

Immediate International Vice President, ISACA, Board of Directors

President, ISACA, Barcelona Chapter

Privacy by Design Ambassador, Government of Ontario, Canada

3

4

Control Visibility

Effectiveness Efficiency

Automation Cost Management

Compliance Accountability Transparency

7

Current approaches to security are siloed, creating risk and impeding innovation.

Fragmented

Intrusive Reactive

Dell - Restricted - Confidential

Unfortunately, the bad guys are more connected

They have many names

Spear-Phishers, BOTnets, DDoS, Zero-Day Threats, Insider threats & former employees

They’re determined to exploit

“disconnected security” Security tools, processes, user profiles and information,

separated in siloes that leave dangerous gaps in-between

10

Dell delivers a better way, with security that works together across your whole business.

Holistic

Transparent

Proactive

Manage operational and business risk

Manage risk

• Compliance • Asset protection • Business continuity

Improved CAPEX and OPEX

management

Manage cost

• Resource optimization

• Process automation

Align IT investments with business goals

Align IT investments

• IT Portfolio management

• Value management • Business process management

Optimal value through effective and efficient

services

Improve service

• Service availability • Service Management

We are in the business of

ENTERPRISE RISK MANAGEMENT…

…through technology

The result: Better Security for a Better Business

Enable the enterprise to

embrace new technologies faster

than the competition

Comply with regulations

and achieve consistent,

reliable governance

Protect the whole enterprise

– outside in and inside out –

efficiently and proactively

Delivering best-in-class security solutions

Identity & Access Mgmt Identity Governance Privileged Mgmt Access Mgmt Compliance & IT Gov

Security Services Incident Response Managed Security Svcs Security & Risk Consult Threat Intelligence

Data/Endpoint

Encryption Protected Workspace

Configuration & Patch Management

Secure Cloud Client

Network

Next Gen Firewall Secure Mobile Access

Email Security

A holistic vision

‘A vision without execution is a hallucination’

Thomas Edison, 1847-1931

18

Let

go

od

gu

ys

in

Ke

ep

bad

gu

ys

ou

t

Sec

uri

ty

Serv

ice

s In

fras

tru

ctu

re &

D

evi

ce

s

Scalable and Mid-Market design point: endpoint to data center to cloud

Application Security

Network Security

Data Security

Dell Email Security

Dell Endpoint

Management

Dell SSL VPN

Dell Next-Gen Firewall

Dell Data Protection Encryption

Dell Protected

Workspace

Dell AppAssure

Endpoint Network Server Storage Cloud

Dell Managed Security Services

Dell Security & Risk

Consulting

Dell Threat Intelligence

Dell Incident

Response

Dell Wyse

Dell Identity & Access

Management

Dell Security Tools

19

Security leadership, scale and recognition

Validated by the industry •  #1 ranked company in Security 500 •  “Recommended” by NSS Labs for

Firewall & IPS – 3 years in row •  Overall Leader in Access

Governance, Kuppinger Cole •  Best Security Service, Cloud

Security, Compliance, Info Security Products Guide

•  Recommended by SC Magazine •  Major Player, Email Security, IDC •  6 Gartner Magic Quadrants

60B+ security events

analyzed daily

2M devices WW

reporting on 40m users

Detects 3B security

events of interest daily

Dell SecureWorks

$14 Trillion in assets

protected daily

15,000 malicious

events analyzed

daily

3,000 security

incidents escalated

daily

Over 18 Trillion

applications controlled

Dell SonicWALL

Dell Data Protection Encryption

Data encrypted & protected on 7M devices

Dell Identity and Access

Management 110M

managed identities

2,000+ security

professionals worldwide

22

23

24

Today - meet with Dell Security subject matter experts in the expo

Complete your solutions showcase evaluations

Schedule a post-event Whiteboard session to address your specific requirements. Contact your account team for details

Learn more by attending future events and workshops. Search www.dell.com/events for upcoming events in your area.

Next Steps

Dell Connected Security Better connected means better protected

#DellST15

28

Sir Isaac Newton, 1642-1727

29

‘If I have seen further it is by standing on the

shoulders of giants’

THANK YOU Ramsés Gallego CISM, CGEIT, CISSP, SCPM, CCSK, ITIL, COBIT(f), Six Sigma Black Belt Security Strategist & Evangelist, Dell Software [email protected] Immediate International Vice President, ISACA, Board of Directors President, ISACA, Barcelona Chapter Privacy by Design Ambassador, Government of Ontario, Canada


Recommended