Dell Seeks To Put Security Into Context With 360-Degree View

Now that Cisco has legitimized* cyber security with the formation of a security services group and the acquisition of Sourcefire, and HP has gone all in on security, enterprise IT powerhouse wannabe Dell is raising the ante with additions to its Connected Security lineup. The four new and/or updated products – ChangeAuditor 6.0, InTrust 10.7, One Identity Cloud Access Manager and SonicWALL NSA2600 firewall – are intended to help provide greater context for security events, and allow users to take a 360-degree, said Tim Sedlack, Sr. Product Manager, Dell Software.

ChangeAuditor tracks, reports and alerts on user and administration changes in real-time, while InTrust addresses regulatory compliance and internal security. Dell One Identity Cloud Access Manager offers web-based access control to utilize on-prem and cloud-based applications, while the NSA2600 features the company’s deep packet engine for real-time inspection.

According to Dell, these four products address the security and compliance challenges of IT’s biggest imperatives: BYOD, cloud, network security and compliance. Its vision for Connected Security is a holistic and connected approach that spans from endpoint to datacenter to cloud, providing the business intelligence, contextual richness and tools needed to mitigate risks and become business enablers.

“What makes us unique is we have expertise for on-prem and applications, and now that’s extended out to the cloud,” said Sedlack. “Our whole goal here is to enable both the broad security piece – compliance and security across the four products – in an accessible way that makes it easier and faster to get to detection and ultimately resolution of the problem. We want to help customers get to solutions faster!”

Just a week ago Dell Software announced SonicWALL secure mobile access solutions. Integration must be a key part of Dell’s formula for success in endpoint security, said Jon Oltsik, Senior Principal Analyst. Enterprise Strategy Group.

Security is a hot market, with almost all (92%) Forbes Global 2000 companies reporting data breaches in the last 12 months. Evolving regulatory and legislative requirements are further adding to enterprises’ security burden, with an estimated average cost of noncompliance at $13.7 million for global organizations, and bring your own device (BYOD) means IT no longer controls the endpoint.

Firewalls are also much in demand, according to new data from Infonetics Research. “Without a doubt, the move to faster network technologies is forcing enterprises to look at upgrading every moving part of their IT infrastructure, firewalls included,” explained Jeff Wilson, Infonetics principal analyst for security.

Security leads the list of criteria for selecting a high-end firewall supplier by a wide margin, and 57% of respondents plan to spend $500,000 or more on high-end firewalls in 2014, signifying a shift to higher spending categories. Infonetics expects 2013 to bring market share changes as Fortinet, Check Point, Palo Alto, and Dell SonicWALL get their high-end firewall offerings into more data center and large campus deals while Cisco and Juniper continue to fend off challengers.

One of the new spending reports put this year’s mobile device and network security market at $9 billion, but growth is forecast to exceed 20% compound annual growth for the next 7 years, in an IT market growing at 3-4% per year. Gartner offers a much lower forecast for the enterprise network security equipment market, but even at 7% CAGR over the next five years, that will still make it a $11.4 billion by 2017. Throw in services, and this market is expected to reach $67.2 billion in 2013, up 8.7% from 2012, and exceed $86 billion in 2016.

Infonetics just reported that while the standalone security market is stalling, the integrated security market is growing. The global network security appliance and software revenue totaled $1.6 billion in 2Q13, an increase of 4% sequentially, and integrated security appliances have gained share every quarter since 4Q11, and Infonetics is forecasting quarterly share gains through 2Q14. SaaS content security market will top $1 billion, while cloud security services is expected to exceed $9 billion by 2017.

Sedlack said the security industry, like the rest of IT, must adapt to the changing environment of Shadow IT and users/lines of business making their own decisions, often without or despite CIO directions. “We recognize that IT doesn’t hold the purse strings any more.”

You still have to be technically out in front, but it’s no longer somebody technical signing the check, he said. “For us, it’s solutions that make our customers lives better and easier.”

Under The Hood

One Identity Cloud Access Manager:

-addresses the need to control access to cloud apps and other apps from multiple end points;

-provides an increased layer of security with access management for both on-premise applications and web-based applications like Salesforce, Google Apps and 0ffice 365; and,

-enables Connected Security by delivering browser-based access through a unified and secure single sign-on, with just-in-time cloud provisioning, federation, authorization, and audit capabilities for all use situations

SonicWALL Network Security Appliance (NSA) 2600 features:

-patented single-pass Reassembly-Free Deep Packet Inspection engine;

-critical security capabilities such as intrusion prevention with sophisticated anti-evasion technology; network-based anti-malware with cloud assist; CloudAV Security; Dell SonicWALL Global Response Intelligent Defense (GRID) Network; SSL decryption and inspection; content/URL filtering; application visibility; application control; and application bandwidth management;

-delivers secure mobile access from a wide variety of platforms including Windows, Linux, MacOS, iOS, Windows 8.1 RT, and Android; and,

-ensures customers always receive the necessary security without compromising network performance.

ChangeAuditor 6.0:

-enables the viewing, correlation and filtering of change events, and provides the relation to other events over the course of time and in chronological order across the Windows environment;

-eliminates unknown security concerns and ensures continuous auditing of critical assets by providing detailed and normalized information on a change, and any related events, in only one click; and,

-delivers on the promise of Connected Security by detecting threats and patterns, enabling a rapid response from any device in real time

InTrust 10.7:

-monitors user access to critical systems and applications, and enables forensic analysis of user and system activity based on historical event data;

-collects events on user and administrator activity from diverse and widely dispersed systems and applications, and presents them in an easy-to-use and complete form suitable for reporting and analysis;

-enriches the Dell SecureWorks offering with intelligent data feeds that capture crucial aspects of user activity on Windows systems, detecting internal threats in less time and with less overhead; and,

-supports Connected Security that’s unified with the business by eliminating silos of information, connecting security information across data, user, network, applications, and services.


*Just kidding. Really!



Author: Steve Wexler

Share This Post On

Leave a Reply