Best-Practices Security In Action

47 %
53 %
Information about Best-Practices Security In Action
Technology

Published on April 4, 2014

Author: dellenterprise

Source: slideshare.net

Description

Enterprises need intelligent, predictive security to excel in a connected world. To that end, Dell Connected Security solutions help organizations in a broad range of industries assure workforce productivity, compliance and customer satisfaction. Here, success stories from energy and professional sports to retailing and banking demonstrate how organizations of all sizes can capitalize on these best-practices security solutions.

Customer perspective 20 2014 Issue 01 | Dell.com/powersolutions Williams Energy: Streamlining identity and access management One of the largest providers of energy infrastructure in North America, Williams Energy needed to replace an outdated application used by employees and contractors to access information resources. Not only was the access request system cumbersome and time-consuming to use, it went down nearly every day, hurting productivity and interrupting business. Williams recognized that it was time for a solution that would streamline the request process while protecting against unauthorized access. After viewing a successful proof of concept, the Williams IT team decided to adopt Identity Manager, part of the Dell One Identity product family. Identity Manager delivered the functionality Williams needed, with no business disruptions. The company’s IT staff used to handle 3,000 to 4,000 provisioning tasks per month. Now, says Paul Tucker, director of information security at Williams Energy, “The time- savings has been remarkable. We can autoprovision 50 percent of our application tasks.” Denver Broncos: Safeguarding networks Running a leading NFL team like the Denver Broncos requires a lot of behind-the-scenes work, including innovative IT. During games, more than 4,000 fans simultaneously access the stadium’s WiFi network. Coaches and other staff use the Broncos’ private and virtual private networks to share classified data, including videos, playbooks and scouting information. But with demands growing, protecting this information was becoming increasingly difficult, and many users were experiencing network performance issues. To address these challenges, the Broncos implemented a security solution that included Dell SonicWALL SuperMassive Next- Generation Firewalls to accelerate the stadium’s traffic, as well as add layers of security for ticketing and other systems. With the help of Dell Professional Services, the deployment was completed in just two days. “We’re impressed with our Dell SonicWALL firewalls, and I sleep better at night having our SuperMassive protecting our network,” says Russ Trainor, vice president of technology of the Denver Broncos. Meanwhile, staff, fans and vendors alike are enjoying fast, secure access. Best-practices security in action Enterprises need intelligent, predictive security to excel in a connected world. To that end, Dell Connected Security solutions help organizations in a broad range of industries assure workforce productivity, compliance and customer satisfaction. Here, success stories from energy and professional sports to retailing and banking demonstrate how organizations of all sizes can capitalize on these best-practices security solutions. Reprinted from Dell Power Solutions, 2014 Issue 1. Copyright © 2014 Dell Inc. All rights reserved.

Dell.com/powersolutions | 2014 Issue 01 21 Fortune 100 retailer: Encrypting confidential information A growing Fortune 100 retail company has thousands of employees who work across North America, many of whom rely on laptop computers to collaborate on projects and communicate with customers. Data stored in these laptops, including credit card and other customer information, can be vulnerable if a laptop is stolen or lost. Moreover, the company’s retail locations have pharmacies on-site, which means that it must comply with health information regulations. The retailer’s IT team deployed the Dell Data Protection | Encryption (DDP | E) solution to safeguard more than 5,000 laptops. The solution enables the company to protect the confidentiality of corporate data and comply with data protection laws. Also, IT can manage endpoint encryption from a single, centralized console. Meanwhile, the data protection solution is transparent to users. “Once DDP | E is implemented, they don’t see a difference in performance on their laptops at all,” says the company’s IT manager. “This solution is meeting our needs for endpoint data protection.” Regional bank: Countering threats A regional bank engaged Dell SecureWorks Managed Security Services (MSS) to monitor security threats in real time. When the Dell SecureWorks Security Operations Center (SOC) detected malicious activity threatening the bank’s lockbox — which stores banking statements and other customer-facing data — an analyst quickly alerted the bank. The bank then initiated an incident response request. Within 48 hours, a Dell incident response team went into action, collecting log files at the bank’s location and identifying the vulnerability on the lockbox. Through malware analysis and reverse data engineering, Dell SecureWorks Counter Threat Unit (CTU) analysts identified the malware as the Belmoo advanced persistent threat (APT) trojan. Fortunately, Dell determined that mass extraction of the bank’s customer data had not taken place. Through the capabilities of MSS and SOC analysts, the expertise of the incident response personnel, and the research and intelligence of the CTU, the bank was able to get the situation fully under control before the attacker could do any more harm. Learn more Dell Connected Security: Dell.com/security Dell, Counter Threat Unit, SecureWorks, SonicWALL and SuperMassive are trademarks of Dell Inc. Reprinted from Dell Power Solutions, 2014 Issue 1. Copyright © 2014 Dell Inc. All rights reserved.

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

Enterprise Security Best Practices - technet.microsoft.com

Enterprise Security Best Practices ... To strengthen your security ... This plan of action should include a strategy for rapidly ...
Read more

Best Practices for Implementing a Security Awareness Program

2 Best Practices in Organizational Security Awareness ... Rather it is the action or inaction by employees and other personnel that can lead to
Read more

10 best practices for Windows security - TechRepublic

10 best practices for Windows security. ... That way, when an administrative action is performed, it is possible to tell who did it. For example, ...
Read more

Automotive Security Best Practices

Automotive Security Best Practices Recommendations for security and privacy ... security information and corrective action outweigh the risks.
Read more

SANS Institute: Reading Room - Best Practices

Reading Room. SANS eNewsletters ... the information risk analysis process needed and the action plan to implement the mitigated ... Security Best Practices ...
Read more

Network Security Policy: Best Practices White Paper - Cisco

Network Security Policy: Best Practices ... The first action following the ... Reviewing the existing policy against known Best Practices keeps ...
Read more

Back To Basics: 10 Security Best Practices - Dark Reading

Back To Basics: 10 Security Best Practices. ... here are 10 security best practices to help protect your ... 7 Reasons Consumers Don’t Take Action on ...
Read more

Best Practices for Security & Privacy | Android Developers

Adding an Easy Share Action; Sharing Files. Setting Up File Sharing; Sharing a File; Requesting a Shared File; ... Best Practices for Security & Privacy.
Read more

Client Security Best Practices Analyzer tool: Action ...

Important: If the action account is a member of a group that has been granted local administrator privileges on this server, then you can disregard the ...
Read more