Dell launches end-to-end security features to protect customers

Dell launches new threat protection for enterprises; which will protect them from major security threats. The company launched its end-to-end security features for its all customers on dell world conference this week.

The PC manufacturing giant said that its new features will enable all enterprises to setup a “comprehensive enterprise security strategy”. Some top features in new dell security portfolio are:

  • Multi-factor authentication which will be expanding the users security for cloud apps. 
  • A new approach of detecting and blocking advanced persistent threats. 
  • Enhancements to the Dell Data Protection (DDP) suite of data security solutions. 

Dell also launches some very interesting data security solution for its customers. DDP ( Dell Data Protection) portfolio will protect its customers data from any threats during transfer. Here are the 3 features which the DDL introduces:

  • Cloud Edition 2.0 : This will allow the companies to encrypt their data and implement policy controls as the data is transferred from endpoints to public cloud platforms. This feature will surround with Google Drive and Microsoft OneDrive for Business in addition to Box and Dropbox. The key of encrypted data will remain in control of the company until it wishes to share it with authorized person. 

  • Server Encryption : This DDP feature will protect the companies data from any threat or vulnerability; by providing complete software encryption to both remote and branch office servers. 

  • End Point Recovery : This is a highly effective DDP feature which enables you to protect yourself from any data loss. The user just had to select the option of continuous backup for laptops, desktops and tablets.
Dell also expanded the Security Analytics Engine included with CAM, to gather information from more sources to further expand the ability to make context-aware security a reality with real-time, adaptive decisions and enforcement.
DDP also comes with cloud access manager 8.1; it is a multi-authentication secure access service for cloud based and internal enterprise application. This will be available from the 28th of Oct on web. 
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...

How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPawned

This article is part of the Maltego OSINT tutorial, where you will learn to identify the already hacked account, and it’s password using the...

5 Key Vulnerabilities in Global Payroll

The cyber threat against payroll is growing in sophistication and frequency, according to the latest FBI cybercrime report. Many of these attacks exploit fixable...