18
Endpoint Security Strategy for the Digital Age Trevor Labrie Data Security Account Executive Dell Technologies

Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

Endpoint Security Strategy for the Digital Age

Trevor LabrieData Security Account Executive

Dell Technologies

Page 2: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.4

Keeping the business free from cyber attacks is an impossible task…

EXTERNAL

THREATSUSER BEHAVIOR

LIMITED SECURITY

RESOURCES

Days before a silent

attack is detected

3.5M108 72%Of end users share

confidential data

externally

Security professionals

needed by 2022 to fill

labor shortage

!

Page 3: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.5

Page 4: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.6

Page 5: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.7

The impossible becomes possible with Dell Endpoint Security

Protect your ecosystem,

giving you the freedom and

peace of mind to focus on other

strategic initiatives that enable

workforce transformation

Page 6: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.8

Security foundation and trust begins at the

endpoint

Cutting edge business protection to enable smart

collaboration

Dell Technologies for Trusted Security helps you manage the growing cyber risk while embracing workforce transformation

Trusted Devices Trusted Data

Built-in security

Most secure commercial devices

Comprehensive ecosystem protection

Smart collaboration

Trusted Security Partner

• SafeGuard and Response

• SafeData

• SafeBIOS

• SafeID

• SafeScreen

Page 7: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.9

SafeBIOS

Only Dell secures end user

credentials with a dedicated security

chip designed into the PC

SafeID

Visibility to BIOS tampering with

Dell exclusive off-host BIOS

verification

SafeScreen

Keep data safe from prying eyes

with improved battery life consumption

over the competition

Trusted Devices with Dell Commercial PCs

Security begins with the endpoint with built-in security,

where establishing platform root of trust can help

ensure your device can be trusted.

Intel vPro platforms include Intel Authenticate and Intel Hardware Shield

Page 8: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.10

Dell Encryption

Data-centric, policy-based encryption

CrowdStrikeFalcon Prevent

Next Gen Anit-Virus

Secureworks

Threat Intelligence Managed Endpoint Protection

SafeGuard and

ResponseSafeData

Prevent Detect

Recover

ProtectRespond

CrowdStrike

Falcon Prevent& Falcon Insight

Incident Management Retainer

Secureworks

Protect &

Recover

Self-healing endpoint visibility and remediation

Absolute

At Rest

Dell Data Security Portfolio

Carbonite

Data backup and restore

Page 9: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.11

Know and Beat your Adversaries

* Source: CrowdStrike Global Threat Report 2018

Page 10: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.12

BREAKOUT TIME

Initial Access

1

MITRE ATT&CK PHASE

Execution

2

Persistence

3

Privilege Escalation

4

Defense Evasion

5

Credential Access

6

Discovery

7

Lateral Movement

8

Collection

9

Exfiltration

10

Command & Control

11TO STAY AHEAD YOU MUST: 1min

DETECT IN

10minINVESTIGATE IN

60minRESPOND IN

The Industry Challenge

Page 11: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.13

Intelligent and prompt security decisions

powered by endpoint telemetry and

validated by dedicated security experts

Comprehensive threat

management

Trusted Data with Dell SafeGuard and Response

• Prevent 99% of endpoint threats from contaminating your environment

• Detect non-malware threats already lurking in the environment and obtain an action plan for focused remediation

• Respond to cyber incidents quickly and efficiently or even prepare in advance for the unthinkable

Page 12: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.14

Next generation Anti-Virus (NGAV): A next-gen antivirus solution using artificial intelligence, (AI),

and machine learning, (ML), that is cloud-hosted and helps stop 99% of all malware and non

malware attacks.

SafeGuard and Response powered by CrowdStrike

Prevent

Stops malware

99% efficacy – both online and offline

Improved system performance

Low impact on endpoint resources with ~ 1% CPU usage

Port blocker

Device Control enables protection of USB devices

Page 13: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.15

Endpoint Detection and Response (EDR): Unified platform that combines NGAV with the ability

to detect malware and non-malware attacks in real time with speed and efficiency.

SafeGuard and Response powered by CrowdStrike

Detect

Advanced protection

Protects against malware and non-malware threats

Full spectrum visibility

Identifies attacks quickly – silent attacks can go unnoticed for an average of 108 days

Includes NGAV

Integrated solution for unified protection

Page 14: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.16

Managed EDR (MDR): Secureworks utilizes skilled professionals to manage the EDR solution,

providing the resources and intelligence to quickly and efficiently remediate identified threats

SafeGuard and Response powered by Secureworks

Detect

Continuous Monitoring

Security experts monitor logs and identify issues 24 x 7 x 365

Fast detection

Reduced time to detect from ~28 weeks to days or even hours

Includes NGAV and EDR

Combines the power of NGAV and EDR with security horsepower

Page 15: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.17

Incident Response: A 40 hour retainer for on-demand assistance from the Secureworks Incident

Response team to respond to and mitigate cyber incidents efficiently and effectively.

SafeGuard and Response powered by Secureworks

Respond

Help when you need it most

Emergency incident response to handle the crisis a breach creates

Proactive

Readiness assessments develop detailed action plans for when the unthinkable happens

Targeted threat hunting

Identities hidden threats lurking in the environment

Page 16: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.18

Protect, control and monitor data

across hybrid applications, devices or

operating systems all without

disrupting user workflows.

Smart collaboration

Trusted Data with Dell SafeData

• Collaboration must be secure

• Fines and penalties for not protecting data are growing

• Data breaches cause brand damage

Page 17: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -

© Copyright 2019 Dell Inc.19

Comprehensive threat

management

Trusted endpoint

security partnerSmart collaborationBuilt-in Security

Trusted Devices enable Trusted Data - helping protect your competitive

advantage while freeing up time to focus on additional strategic priorities

SafeID and SafeBIOS

SafeScreen

Foundational to Dell’s most secure

commercial PCs

SafeGuard and Response

Intelligent security decisions powered

by telemetry and security experts

SafeData

Data security wherever data

roams

Trusted Devices

enable

Trusted Data

from a single, trusted

partner

Why Dell

Page 18: Endpoint Security Strategy - Digital Transformation · 2020-07-16 · Trusted endpoint security partner Built-in Security Smart collaboration Trusted Devices enable Trusted Data -