SlideShare a Scribd company logo
1 of 9
Download to read offline
MT 39: Best-practice sharing
How Dell stays secure and compliant worldwide
Alan Daines
Chief Information Security Officer (CISO),
Executive Director, Cybersecurity
Welcome
#1 Ranked
Security company in Security 500
30K+ Concurrent
Connections on SonicWALL Aventail
250+
SonicWALL Supermassive firewalls
deployed
117K
Systems encrypted with Credant
63B Dell Events
Analyzed by SecureWorks monthly
250k
Identities managed by D1IM
Top of mind
threats
• Identity &
Access
Management
• Data Loss
• Product
vulnerabilities
Dell - Restricted - Confidential6
Organizational Structure
Security
Infrastructure
Security
Consulting
Governance,
Policy & Risk
Cyber Response
Services
• 4 components: Network Security, Security
Tools, Identity & Directory Services, and
Technology Strategists
• Engineering & Operations combined in
each component (except Strategists)
• Supported Technologies: Firewalls, IPS,
Proxies, DDOS Protection, VPN, Antivirus,
HIPS, DLP, PKI, RMS, SIEM, Password Vault,
Hard Drive Encryption, Active Directory,
Single Sign-On, etc.
• Provides security design/architecture advice
for product development, software
development, infrastructure deployments,
services delivery, and 3rd party relationships.
• Oversees secure development lifecycle
utilizing source code analysis and threat
modeling.
• 3 Components: eForensics, Threat &
Vulnerability Management, and Incident
Response
• Key Activities: Litigation Support, Ethics
Investigations, Pen Testing, Vulnerability
Scanning & Remediation Oversight,
Incident Management, 1st Level Security
Helpdesk, etc.
• Responsible for Compliance and Risk
Management for the IT organization.
• Key Areas: PCI, SOX/Financial Reporting,
Self-Assessments, Risk Assessment, Policies
& Standards, and Data Classification.
CISO
Securing Dell with Dell – leveraging our strengths
SonicWALL
• 30,000
concurrent
users enjoy
quick, reliable
SonicWall VPN
access
• Manage
changes across
more than 700
firewalls
worldwide.
Dell IAM
• Simplifying IAM
and automated
provisioning
using Dell One
Identity
• Protection
against Insider
Threats using
Dell Change
Auditor
KACE
• Deployed
KACE K1000
Management
Appliance
• Full patch
management
in Dell’s highly
secure,
segmented PKI
environment
DDP | E
• 111,000 Dell
endpoints
encrypted to
keep data safe
in case a
device is lost
or stolen
SecureWorks
• Security
monitoring for all
Dell Firewalls and
IPS
• Monthly 60
billion events
monitored for
Dell
Q & A
Thanks!

More Related Content

Viewers also liked

Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
dreamforce2006
 

Viewers also liked (7)

Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Dell vision and solutions
Dell vision and solutionsDell vision and solutions
Dell vision and solutions
 
The dell model
The dell modelThe dell model
The dell model
 
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
 
Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Salesforce Partner Program
Salesforce Partner ProgramSalesforce Partner Program
Salesforce Partner Program
 
Channel Performance Management Optimization
Channel  Performance Management OptimizationChannel  Performance Management Optimization
Channel Performance Management Optimization
 

More from Dell World

More from Dell World (20)

Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 
Client solutions for the modern workforce
Client solutions for the modern workforceClient solutions for the modern workforce
Client solutions for the modern workforce
 
Prescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready EnterprisePrescriptive Cloud Services for the Future Ready Enterprise
Prescriptive Cloud Services for the Future Ready Enterprise
 
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case StudyData Movement, Management and Governance In The Cloud: DocuSign Case Study
Data Movement, Management and Governance In The Cloud: DocuSign Case Study
 
Innovations in desktop virtualization: Expanding to workstation use cases
Innovations in desktop virtualization: Expanding to workstation use casesInnovations in desktop virtualization: Expanding to workstation use cases
Innovations in desktop virtualization: Expanding to workstation use cases
 
Extensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud PortfolioExtensibility: The Key To Managing Your Entire Cloud Portfolio
Extensibility: The Key To Managing Your Entire Cloud Portfolio
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Dell best-practice sharing: How Dell stays secure and compliant worldwide - Daines

  • 1. MT 39: Best-practice sharing How Dell stays secure and compliant worldwide
  • 2. Alan Daines Chief Information Security Officer (CISO), Executive Director, Cybersecurity Welcome
  • 3.
  • 4. #1 Ranked Security company in Security 500 30K+ Concurrent Connections on SonicWALL Aventail 250+ SonicWALL Supermassive firewalls deployed 117K Systems encrypted with Credant 63B Dell Events Analyzed by SecureWorks monthly 250k Identities managed by D1IM
  • 5. Top of mind threats • Identity & Access Management • Data Loss • Product vulnerabilities
  • 6. Dell - Restricted - Confidential6 Organizational Structure Security Infrastructure Security Consulting Governance, Policy & Risk Cyber Response Services • 4 components: Network Security, Security Tools, Identity & Directory Services, and Technology Strategists • Engineering & Operations combined in each component (except Strategists) • Supported Technologies: Firewalls, IPS, Proxies, DDOS Protection, VPN, Antivirus, HIPS, DLP, PKI, RMS, SIEM, Password Vault, Hard Drive Encryption, Active Directory, Single Sign-On, etc. • Provides security design/architecture advice for product development, software development, infrastructure deployments, services delivery, and 3rd party relationships. • Oversees secure development lifecycle utilizing source code analysis and threat modeling. • 3 Components: eForensics, Threat & Vulnerability Management, and Incident Response • Key Activities: Litigation Support, Ethics Investigations, Pen Testing, Vulnerability Scanning & Remediation Oversight, Incident Management, 1st Level Security Helpdesk, etc. • Responsible for Compliance and Risk Management for the IT organization. • Key Areas: PCI, SOX/Financial Reporting, Self-Assessments, Risk Assessment, Policies & Standards, and Data Classification. CISO
  • 7. Securing Dell with Dell – leveraging our strengths SonicWALL • 30,000 concurrent users enjoy quick, reliable SonicWall VPN access • Manage changes across more than 700 firewalls worldwide. Dell IAM • Simplifying IAM and automated provisioning using Dell One Identity • Protection against Insider Threats using Dell Change Auditor KACE • Deployed KACE K1000 Management Appliance • Full patch management in Dell’s highly secure, segmented PKI environment DDP | E • 111,000 Dell endpoints encrypted to keep data safe in case a device is lost or stolen SecureWorks • Security monitoring for all Dell Firewalls and IPS • Monthly 60 billion events monitored for Dell