CHANNELS

Subscribe to the InfoTech eNewsletter

infoTECH News

TMCNet:  Dell Secures Critical Business Data and Devices While Enabling the Mobile Workforce With New Additions to its Security Portfolio

[April 17, 2014]

Dell Secures Critical Business Data and Devices While Enabling the Mobile Workforce With New Additions to its Security Portfolio

(ENP Newswire Via Acquire Media NewsEdge) ENP Newswire - 17 April 2014 Release date- 16042014 - Frankfurt am Main, Germany - At the Dell Enterprise Forum customer and partner event today, Dell showcased new security services and solutions that further expand its security portfolio.

With the new offerings, businesses can defend all technology touch points to better safeguard the corporate network, critical data and devices while enabling employee productivity and confidently protecting the mobile workforce.

As security threats continue to evolve and multiply, organizations are struggling to both keep pace with major technology trends such as Bring Your Own Device (BYOD), cloud and mobility, and defend their perimeter. The frequency of attacks is expanding at an alarming rate globally. In fact, Dell prevented 1.06 trillion intrusion events in 249 countries in the past year alone1. A Dell global security survey released in February found that 74 percent of global respondents had experienced a security breach in the past year, but on average, respondents only allocated 17 percent of their IT budget to security. In order for organizations to truly transform their business, it is imperative they ensure data is protected and their workforce is productive. In today's world, that means protection at the data center, in the cloud, within the network and especially at the endpoint.

According to a recent Forrester Research report2: 'Employee endpoints are frequent targets of cybercriminals, and gaining control of the endpoint provides easy access to some of the organization's most sensitive data assets. Forrester believes that any comprehensive data security strategy must include both reducing the endpoint threat surface and limiting exposure to data loss involving these endpoints.' 'In today's evolving technology landscape, organizations face an unprecedented number and variety of security threats. Only a connected approach to security protects an organization's entire IT environment without compromising access, collaboration, performance or cost,' said John McClurg, Chief Security Officer, Dell. 'Our portfolio updates shared today will help customers implement a holistic security strategy to protect their businesses from the outside-in and inside-out. Ultimately, Dell's differentiated security approach allows businesses to defend all technology touchpoints from the device to the datacenter to the cloud.' Dell SecureWorks Expands Cyber Threat Services Portfolio with Innovative Advanced Endpoint Threat Detection Service Dell SecureWorks, an industry leader in information security services, launched a new, cutting-edge Advanced Endpoint Threat Detection (AETD) managed service. The AETD solution is the latest addition to Dell SecureWorks' Advanced Threat Services portfolio-a comprehensive suite of Internet security services that combat advanced cyberthreats-which features the Managed Advanced Malware Protection (MAMP) service and the Targeted Threat Hunting service. Companies hosting valuable data require multiple layers of security, including a 24x7 endpoint threat detection solution, in order to thwart shifting threats.

Dell's AETD service has a number of threat-oriented features: Always-on endpoint assessments: The 24x7 aspect of the solution gives customers the earliest possible warning that an adversary might be lurking on a company's endpoints; Dell SecureWorks experts, specially trained to analyze the advance threat, will determine the severity of any activity and escalate critical threats promptly.

Unique endpoint intelligence delivered by one of the industry's leading security research teams: Dell SecureWorks has conducted advanced threat hunting engagements on thousands of systems and has developed signatures and elite intelligence for detecting endpoint compromise.

Specific data around attack vector: Many competing endpoint solutions simply advise to re-image compromised devices , but Dell SecureWorks can reveal precisely how the endpoint was compromised, often allowing customers to patch their systems instead of undertaking a costly re-imaging effort.

A fully managed service: Dell SecureWorks personnel will not only patch and update the analysis software, but will deploy new intelligence updates on a regular basis and will monitor the system's availability.

Dell Secure Mobile Access Revolutionizes BYOD Mobile Worker Security with per-App VPN Access Controls for Any Mobile App The updated Dell Secure Mobile Access (SMA) solution provides organizations with per-app VPN access to enterprise data and resources, while protecting the corporate network from security threats. The BYOD migration and increase of both employee-and employer-owned mobile devices in the workplace has resulted in a mandate for IT to enable secure mobile access to corporate data and resources. By enabling IT to restrict VPN access only to a set of trusted mobile applications, Dell's SMA solution is designed to manage and secure access to business applications and data, while coexisting with personal applications and respecting personal data privacy. While the potential for security breaches and the introduction of malware into the network can result from any type of mobile access, the risk intensifies with the co-mingling of business and personal data and applications when employees use personal devices for work.

Dell's SMA solution combines a Dell SonicWALL E-Class Secure Remote Access Appliance powered by the new Secure Mobile Access Operating System 11.0, with the Dell SonicWALL Mobile Connect 3.1 mobile application, to enable IT to easily provision secure mobile access and role-based privileges for both managed and unmanaged devices for tens of thousands of users. Additional benefits include: Allows only registered mobile applications to access the VPN, while blocking personal applications that might propagate mobile malware threats and waste corporate bandwidth.

Supports any mobile application and secure container, requiring no modification, application wrapping or software development kit tools.

Reduces business risk by enforcing user compliance to personal device authorization policy, and managing and reporting end-user acceptance of BYOD policy terms.

Integrates with the Dell Enterprise Mobile Management solution, including its Mobile Workspace container technology, to enable efficient delivery of the user's applications and data in a secure and trusted way. For organizations using third party mobility solutions, the Dell Secure Mobile Access solution supports any mobile app and container, so it can easily and quickly be integrated into any environment.

Dell Data Protection | Hardware Crypto Accelerator Boosts Endpoint Security in Award-Winning Dell Data Protection | Encryption Portfolio Dell's new Dell Data Protection | Hardware Crypto Accelerator (HCA) extends the current Dell Data Protection | Encryption portfolio and helps customers rest assured that their data is secured in accordance with the highest enforceable standards. With FIPS 140-2 level 3 certification - the 'Fort Knox' of client protection - HCA supports Dell's mission to provide agile, manageable and effective solutions to secure endpoints for IT infrastructures of all sizes through a number of advancements: HCA converts the hard drive of select Dell Latitude notebooks, OptiPlex desktops and Precision workstations into fast ( 3 gigabits-per-second), self-encrypting, tamper-resistant devices, completely eliminating the need to purchase separate self-encrypting drives (SED)-all without sacrificing system performance.

HCA enables compliance and is connected into the Dell data protection so IT administrators can pull single set of compliance data across their devices.

Some SED solutions store data and the encryption key on the same device, however with DDP | HCA enhanced by the Trusted Platform Module (TPM), the encryption key is stored independently from both the drive and Hardware Crypto Accelerator. Therefore, should the drive be removed from the system, the data is automatically rendered irretrievable.

Availability: Dell SecureWorks Advanced Endpoint Threat Detection managed service is currently available in North America and will be available in EMEA in the latter part of Q2 2014.

Dell Secure Mobile Access will be available for sale/download worldwide mid-year.

Dell Data Protection | Hardware Crypto Accelerator is currently available.

About Dell Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.

About Dell Enterprise Forum Dell Enterprise Forum is the premier technical learning event for Dell enterprise customers and channel partners. The conference, held annually in the US and Europe, offers an intensive, interactive learning experience across the data center-from servers and storage to networking and converged solutions.

Dell and Dell Enterprise Forum are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others 1 Dell Network Security Threat Report 2013, summarizes threats statistics for 2013 and outline predictions for threats in 2014.

2 Endpoint Security Trends, Q2 2013 to Q4 2014, by Chris Sherman with Stephanie Balaouras, Forrester Research, Inc., November 7, 2013.

(c) 2014 Electronic News Publishing -

[ InfoTech Spotlight's Homepage ]


blog comments powered by Disqus

FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter