Dell launches end-to-end security features to protect customers

Dell launches new threat protection for enterprises; which will protect them from major security threats. The company launched its end-to-end security features for its all customers on dell world conference this week.

The PC manufacturing giant said that its new features will enable all enterprises to setup a “comprehensive enterprise security strategy”. Some top features in new dell security portfolio are:

  • Multi-factor authentication which will be expanding the users security for cloud apps. 
  • A new approach of detecting and blocking advanced persistent threats. 
  • Enhancements to the Dell Data Protection (DDP) suite of data security solutions. 

Dell also launches some very interesting data security solution for its customers. DDP ( Dell Data Protection) portfolio will protect its customers data from any threats during transfer. Here are the 3 features which the DDL introduces:

  • Cloud Edition 2.0 : This will allow the companies to encrypt their data and implement policy controls as the data is transferred from endpoints to public cloud platforms. This feature will surround with Google Drive and Microsoft OneDrive for Business in addition to Box and Dropbox. The key of encrypted data will remain in control of the company until it wishes to share it with authorized person. 

  • Server Encryption : This DDP feature will protect the companies data from any threat or vulnerability; by providing complete software encryption to both remote and branch office servers. 

  • End Point Recovery : This is a highly effective DDP feature which enables you to protect yourself from any data loss. The user just had to select the option of continuous backup for laptops, desktops and tablets.
Dell also expanded the Security Analytics Engine included with CAM, to gather information from more sources to further expand the ability to make context-aware security a reality with real-time, adaptive decisions and enforcement.
DDP also comes with cloud access manager 8.1; it is a multi-authentication secure access service for cloud based and internal enterprise application. This will be available from the 28th of Oct on web. 
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...