Dell Data Guardian Products Infographic

1 downloads 214 Views 134KB Size Report
4 Stroz Friedberg, “On the Pulse: Information Security Risk in American Business,” ... devices. Removable storage. U
How are you protecting data from insider threats?

010110110101010010010101011100011 1010010101000011101010100100101010 1010100001110101010010010101010000 0010110110101010010010101011100011 1010000111010101001001010101000010 1010000111010101001001010101000010 0111110100010101000010000100000101 1010001010101010011000000110000001 1010101110010101010000001010000010 74% of breaches originate within the 1 extended enterprise

40%

22%

Employees

Third parties

12%

Exemployees

Not all threats are due to malicious activity.

Carelessness can lead to accidental data theft and loss. Accidental

Malicious

2

2/3

1/3

How do accidents happen? Poor data protection awareness

Use of personal devices

Cloud services

Removable storage

Unauthorized apps

Lack of responsibility

35% of employees spend an average of two hours each

week working in public places

3

87% of senior managers upload business information on

personal email or cloud accounts

4

Who’s responsible for protecting data?

36%

Only of U.S. employees feel that protecting company 5 data is their responsibility

You want to enable your employees to collaborate and be productive — without intentionally or unintentionally putting data at risk.

Empower employees while protecting data with Dell Data Guardian Protect

Guard data wherever it goes and however it is used.

Control

Define who can access data, when data can be accessed and how. 0010110010101 101000101001

Monitor

Gain clear visibility into data activity and location.

Ready to learn more? Visit Dell.com/datasecurity or contact [email protected]  learswift, “Clearswift Insider Threat Index (CITI),” 2015, http://pages.clearswift.com/rs/591-QHZ-135/images/Clearswift_Insider_Threat_InC dex_2015_US.pdf 2 Ibid. 3 “Dell and Intel Study Uncovers Truth Behind Technology and the Workforce,” February 2014, http://www.dell.com/learn/hr/en/hrcorp1/press-releases/2014-12-02-dell-intel-study-uncovers-truth-behind-technology 4 Stroz Friedberg, “On the Pulse: Information Security Risk in American Business,” 2014, https://www.strozfriedberg.com/wp-content/uploads/2014/01/Stroz-Friedberg_On-the-Pulse_Information-Security-in-American-Business.pdf 5 Clearswift, “Clearswift Insider Threat Index (CITI),” 2015, http://pages.clearswift.com/rs/591-QHZ-135/images/Clearswift_Insider_Threat_Index_2015_US.pdf 1

Copyright © 2017 Dell. All Rights Reserved. Dell and the Dell logo are trademarks or registered trademarks of Dell in the U.S.A. and/or other countries. Intel and the Intel logo are trademarks or registered trademarks of Intel in the U.S.A. and/or other countries. Other trademarks and registered trademarks are the property of their respective owners. The content is provided as is, without express or implied warranties of any kind.