Achieving Deeper Network, Mobile and Email Security

Preview:

DESCRIPTION

Today’s cybercriminals use complex techniques to avoid detection. Simplify your security oversight and governance so you can combat both internal and external threats—all while controlling costs. Learn about the latest zero-day attacks and bring-your-own-device (BYOD) challenges. You will also see how Dell SonicWALL solutions offer deeper network security and control against emerging threats, simple and secure mobile access to critical data and apps, as well as spam prevention and secure email exchanges.

Citation preview

1 Dell World 2014

Achieve deeper network, mobile and email security with Dell Security solutions

John Gordineer, Director of Product Marketing Dell Security, November 2014

2 Dell World 2014

Have you seen these headlines?

3 Dell World 2014

Have you seen these headlines?

4 Dell World 2014

Have you seen these headlines?

5 Dell World 2014

Have you seen these headlines?

6 Dell World 2014

Have you seen these headlines?

7 Dell World 2014

In 2013, 89% of breaches were caused by intrusions or malware

8 Dell World 2014

69% of attacks are malware

80% of malware attacks in 2012 were redirects from legitimate sites

81% of respondents admit to shutting off security functionality to improve network performance

9 Dell World 2014

69% of attacks are malware

80% of malware attacks in 2012 were redirects from legitimate sites

81% of respondents admit to shutting off security functionality to improve network performance

80% of malware attacks in 2012 were redirects from legitimate sites

10 Dell World 2014

New malware samples discovered by researchers every day, according to Georgia Tech 100,000

$5.4M Average cost of a US data breach in

2013, according to Ponemon Institute research

Estimated cost to US businesses from data

breaches in 2011, says Online Trust Alliance

$6.5B

60%

7,000+ New vulnerabilities

annually tracked by the Dell Counter Threat Unit

New malware samples detected by Antivirus solutions, Cyveillance study

shows

19% Estimated number of

healthcare providers with 2 or more breaches in the

last two years

11 Dell World 2014

Application Chaos

Unimportant Apps Important Apps

12 Dell World 2014

According to NSS labs estimate, 50% of Internet traffic is now encrypted

13 Dell World 2014

Ransomware has emerged

14 Dell World 2014

Gartner predicts by 2017, half of employers will require employees to supply their own device for work purposes

15 Dell World 2014

The BYOD Challenge

Personal Business

Increased business risks:

• Corporate data loss

• Malware attack

• Personal data privacy compliance

16 Dell World 2014

SOURCE: Yankee Group, June 2012

Top five mobile threats

1. Data loss from lost stolen of decommissioned devices

2. Information stealing mobile malware

3. Data loss and data leakage through poorly written third party applications

4. Vulnerabilities within devices, OS design and third party applications

5. Insecure Wi-Fi network or rogue access point

17 Dell World 2014

Volume of spam per day in 2013

Number of unique phishing sites detected in March 2014

44,000

557 Attack on brands

in Q1 2014

20 million Unique malware threats in 2013

69 billion

Of all email that enters a typical corporation is bad

90%

18 Dell World 2014

Brands under attack

Dell World 2014

Solving the problems

20 Dell World 2014

Secure your network

21 Dell World 2014

Threats have evolved but firewalls & IPS have not

22 Dell World 2014

Next-generation firewall technology

1. Stateful Packet Inspection

2. Intrusion Prevention 3. Threat Prevention (virus, malware) 4. Application Control 5. SSL Decryption 6. User Identification

Stateful Packet Inspection

Deep Packet Inspection

23 Dell World 2014

Next-generation firewall (NGFW) Breaking the malware cycle

Compromised “Good” Site

Malware Hosting Site

Page Visit

Malware Request

Exploit

Malware

SS

L D

ec

ryp

tio

n

URL Filtering

Intrusion Prevention

Network Anti-Virus

Cloud Anti-Virus

Botnet Filtering

24 Dell World 2014

Overcoming application chaos…

demands advanced application intelligence…

focused on users, apps and content.

25 Dell World 2014

Application intelligence and control

Policy

Identify Categorize Control

? ?

? ?

? ?

? Visualization

26 Dell World 2014

Secure your mobile access

27 Dell World 2014

Mobile security– managed device

Network

28 Dell World 2014

Mobile security – personal device

Trusted User?

Trusted Device?

Trusted Mobile apps?

Trusted User

Trusted Device

Trusted Mobile apps

Authenticate user

Validate device ID and security posture

Enforce BYOD policy acceptance

Connect only authorized apps to VPN and resources

Network

29 Dell World 2014

Mobility Management and Security Solutions

EMM functions

Real-time reporting and alerts

User self-service

Secure access to corporate resources

Systems, device, app and content management

Endpoint management Secure Mobile Access

EMM

Container management

30 Dell World 2014

Secure your email

31 Dell World 2014

Email security – beyond anti-spam

Advanced Protection

Spam, Virus, Phishing Brand Protection Compliance &

Encryption

32 Dell World 2014

Advanced protection

Connection management rejects up to 80% of spam and other threats before filtering

Filtering removes remaining spam and delivers good email to the email server

33 Dell World 2014

The big five regulations – what’s common?

Encryption of data

34 Dell World 2014

Brand protection: who is sending emails on your behalf?

I need visibility

I can take action

I can align everything to the known and shrink the unknown

Known Servers

Unconfirmed sources

Threats and

unknown sources I have no idea

Dell World 2014

How Dell can help

36 Dell World 2014

36

Dell delivers best-in-class security solutions

Identity & Access Mgmt

Identity Governance

Privileged Mgmt

Access Mgmt

Compliance & IT Gov

Security Services

Incident Response

Managed Security Svcs

Security & Risk Consult

Threat Intelligence

Data/Endpoint

Encryption

Protected Workspace

Configuration & Patch

Management

Secure Cloud Client

Network

Next Gen Firewall

Secure Mobile Access

Email Security

37 Dell World 2014

Dell SonicWALL security portfolio Network security Secure mobile

access Email security

Products (appliances) Products (appliance, virtual appliance)

Products (appliance, virtual appliance, hosted, software)

Add-on security services and app

Add-on security services

Add-on security services

Policy and management Add-on application

Hosted Software

Virtual appliance

Virtual appliance

WAN Acceleration

Clean Wireless –SonicPoint N Series

38 Dell World 2014

Dell SonicWALL Next-Generation Firewalls

SuperMassive E10800 SuperMassive E10400

SMB/Campus/Branch

Enterprise, Data Center SuperMassive Series

TZ 215/W TZ 205/W TZ 105/W

SuperMassive 9600 SuperMassive 9400 SuperMassive 9200

TZ Series

NSA 4600 NSA 3600 NSA 2600

NSA 220/250M

NSA 6600 NSA 5600

NSA Series

39 Dell World 2014

Cutting-edge threat prevention

Botnet command and control traffic detection and blocking

Comprehensive signatures, server and client-side attacks

Denial of Service / Flood detection and prevention

Protocol abuse / anomaly based detection

Geographical IP monitoring and blocking

Sophisticated anti-evasion technology

SSL traffic inspection

Visualization and reporting

40 Dell World 2014

E-Class Secure Remote Access Appliances

Secure Remote Access Appliances

Dell SonicWALL Secure Mobile Access

SRA EX7000 SRA EX6000 Virtual Appliance SRA EX9000

Simple, policy-enforced per app

VPN access to corporate data and resources

without compromising

security

Secure mobile access for all users, devices, apps and resources

Spike License

Secure Virtual Assist

Advanced Reporting

Native Access Modules

Mobile Connect

End Point Control

SRA 1600 Virtual Appliance SRA 4600

Secure Virtual Access

Web App Firewall

Secure Virtual Assist

Spike License Mobile Connect

End Point Control

Secure Virtual Meeting

41 Dell World 2014

Dell SonicWALL Secure Mobile Access solution

• Only per app VPN solution that can support any mobile app or container without modification and support iOS, Mac OSX, Android and Kindle

Simplify per app VPN

• Mobile device policy enforcement and management Achieve BYOD

compliance

• Per app VPN access controls, mobile app and device integrity validation and user authentication Protect from threats

• Scalable, network-level access to more resources including web, client/server, hosted virtual desktop and back connect such as VoIP

Access more resources

Enable mobile worker productivity while protecting from threats

42 Dell World 2014

E-Class Email Security Series

Email Security Series

ESA ES8300 Virtual Appliance E-Class Software

ESA 4300/3300 Virtual Appliance Software

• Stops spam, viruses and phishing attacks

• Stops leaks of corporate and confidential information

• Flexibility for corporate control and user empowerment

• Easy-to-install and manage for a quick return on investment

• Powerful granular reporting

Dell SonicWALL Email Security

Hosted Email Security

Email Protection

Emil Anti-Virus

Emil Compliance

Email Protection

Emil Anti-Virus

Emil Compliance

43 Dell World 2014

Deployment platform choice to best meet infrastructure requirements

On

-pre

mise

s

Hosted Email Security

Comprehensive Anti-Spam Service (CASS)

Hardware

Windows software

Virtual appliance

44 Dell World 2014

Dell SonicWALL Email Security

Proven expertise, industry leading technology

Proven expertise • 10,000+ customer installations

• 2 million+ mailboxes protected

• Global deployments (14+ languages supported)

• Large customer installations with tens and thousands of mailboxes

• 24 x 7 on-line and phone support

Industry leading technology • Email Security patent leader

(14 approved, many pending)

• SC Magazine 5 star overall rating

Dell Software

Gartner Magic Quadrant • Unified Threat Management - Leader

• Secure Remote Access - Visionary

NSS Labs Security Value Maps • Next-Generation Firewall: Recommended (3 years in a row)

• Intrusion Prevention System: Recommended (2 years straight)

ICSA Labs • Enterprise Firewall Certification

• Next-Generation Firewall Evaluated

3rd party validation: Gartner, NSS Labs, ICSA Labs

46 Dell World 2014

The Dell difference. Better. Faster. Lower TCO.

• Demonstrated better security * than leading enterprise firewalls

• Tested fastest in the industry for detecting and dropping malware hidden in encrypted traffic

• Disruptively low TCO provided by a combination of low upfront cost and advanced centralized management tools

“Overall, in choosing Dell SonicWALL over Check Point, our cost-savings approximate $100,000.”

* 2014 NSS Labs NGFW Secure Value Map and Comparative Analysis

47 Dell World 2014

Snapshot • Public school district with 26,000

students and 4,800 teachers /staff • 21 elementary schools, six middle

schools and seven high schools

Challenge • District is tasked with securing on its network over 9,000

student and employee mobile devices at any one time.

Results • By deploying a Dell SonicWALL solution, district cuts costs by 50% • Students increase access to critical educational resources; teachers

can access other schools around the world • Mobile device users are authenticated, ensuring secure BYOD

Hall County Schools

Dell World 2014

48 Dell World 2014

“We increased our return on investment by using the Dell SonicWALL SRA 4600 with the Dell SonicWALL SuperMassive 9000 because we offload VPN traffic from our main firewall to the SRA. It took an engineer under an hour to set up a portal for vendors and a portal for employees, customizing each with Broncos themes.” Russ Trainor, VP of Technology, Denver Broncos

Denver Broncos

Dell World 2014

Dell World 2014

“When customers look at the Dell SSL VPN solution, they’ll know that it’s been developed to meet our manageability and scalability needs as a large enterprise. Very few other VPN vendors could meet these needs.” Alan Daines, Director of Security Engineering and Operations at Dell

Dell

Dell World 2014

Dell World 2014

Thank you.

Recommended