Welcome!

News Feed Item

Dell One Identity Manager Safeguards and Empowers Organizations by Granting Appropriate Access to Needed Resources

Dell announces the recent selection of Dell One Identity Manager by Trillium Health Partners and Dell itself to address the challenges presented by today’s constantly shifting user access landscape, which includes the need to control access to a moving target of applications and data, and to provide access to everything from everywhere, without sacrificing security. This move marks the renewed emphasis by organizations to enable appropriate access, while eliminating the risk of employees having more access than they need to do their jobs. Employees with too much access can become internal threats, which are the most prominent threats in the security landscape today.

Although organizations increasingly find that inappropriate access by end users, partners, and administrators is one of the vulnerabilities putting them at greatest risk, they also must adhere to compliance regulations without sacrificing users’ ability to get to what they need, when they need it. The choice of Dell One Identity Manager signals a focused move to stay ahead of these evolving requirements.

With Dell One Identity Manager, organizations have a modular, integrated and affordable way to establish, execute, audit, and control access, no matter what needs to be accessed, who is accessing, how, or from where. While improving security, the solution also boosts business agility by enabling the organization to assign permissions faster — to the right people — increasing productivity and achieving compliance faster, and with less cost and effort.

Simplifying Global Identity and Access Management

Dell’s deployment of its Identity Manager solution has provided significant value to the company, increasing compliance and operational efficiency across its global network. The challenge of appropriately granting and tracking the access privileges and permissions on the corporate network for Dell’s 150,000 employees, consultants and contractors worldwide was due to an ongoing process of employee and consultant onboarding, as the organization looked to grow its salesforce and acquired new companies.

With the deployment of Dell One Identity Manager, Dell has grown from its original identity and access management (IAM) solution, and now can rely on a global, intelligence-driven IAM platform that ties identities, permissions and roles to business rules. The company can track and report on rights, activities and policies in real time using the solution’s access management and reporting tools. The Identity Manager platform also has helped Dell save time by improving self-service and workflow, placing important tasks, approvals, and reports in the hands of line-of-business personnel rather than IT.

Supporting Quotes:

John Milburn, executive director, Identity and Access Management, Dell Software

“Dell understands that IAM needs continue to change with new threat landscape and governance needs, and for that reason, we continue to add capabilities to our Identity Manager solution so our customers can stay ahead of the next threat. Dell places a high priority on leveraging its own IP to create more secure, agile and productive work environments for its employees. We’re pleased to provide such a valuable contribution to protecting and better serving not only our own employees, but also our customers, who use it to secure their clients, patients and partners.”

Alan Daines, Chief Information Security Officer, Dell

“With a team of more than 150,000 employees, consultants and contractors worldwide, it was critical that we focus on providing a secure environment that did not stand in the way of people doing their jobs, and also could evolve with business needs. We needed a sound IAM solution that would address our large-scale needs, and still be flexible enough to grow with our business. Dell One Identity Manager uniquely fits the bill both now, and where Dell is heading in the future. This deployment puts us in a much better position to evolve with market movements and create opportunities for company growth.”

Iain Paterson, Information Security Officer, Trillium Health Partners

“Improving security in a healthcare setting is a journey, and, at Trillium, we’ve begun the journey by addressing our access challenges. It has always been difficult to efficiently manage and provide appropriate privileges for our complex and diverse user base, but, with Dell One Identity Manager, we’ve transformed business processes while addressing this core problem. We’ve reduced our risk profile and improved the IT/business relationship with faster provisioning of users, simplified roles and privileges, and attestation, and we intend to leverage even more of Dell One Identity Manager’s functionality as we continue on our security journey.”

Supporting Resources:

Delivering Complete and Connected Software Solutions

Dell Software empowers companies of all sizes to experience Dell’s “Power to Do More” by delivering scalable yet simple-to-use solutions that can increase productivity, responsiveness and efficiency. Dell Software is uniquely positioned to address today’s most pressing business and IT challenges with holistic, connected software offerings across five core solution areas, encompassing data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, helps customers simplify IT, mitigate risk and accelerate business results.

About Dell

Dell Inc. listens to customers and delivers innovative technology and services that give them the power to do more. For more information, visit www.dell.com.

Tweet This: Dell One Identity Manager Safeguards, Empowers Orgs by Granting Appropriate Access http://dell.to/1noqx2G

Dell is a trademark of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
yperConvergence came to market with the objective of being simple, flexible and to help drive down operating expenses. It reduced the footprint by bundling the compute/storage/network into one box. This brought a new set of challenges as the HyperConverged vendors are very focused on their own proprietary building blocks. If you want to scale in a certain way, let’s say you identified a need for more storage and want to add a device that is not sold by the HyperConverged vendor, forget about it....
With Cloud Foundry you can easily deploy and use apps utilizing websocket technology, but not everybody realizes that scaling them out is not that trivial. In his session at 21st Cloud Expo, Roman Swoszowski, CTO and VP, Cloud Foundry Services, at Grape Up, will show you an example of how to deal with this issue. He will demonstrate a cloud-native Spring Boot app running in Cloud Foundry and communicating with clients over websocket protocol that can be easily scaled horizontally and coordinate...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Any startup has to have a clear go –to-market strategy from the beginning. Similarly, any data science project has to have a go to production strategy from its first days, so it could go beyond proof-of-concept. Machine learning and artificial intelligence in production would result in hundreds of training pipelines and machine learning models that are continuously revised by teams of data scientists and seamlessly connected with web applications for tenants and users.
Recently, WebRTC has a lot of eyes from market. The use cases of WebRTC are expanding - video chat, online education, online health care etc. Not only for human-to-human communication, but also IoT use cases such as machine to human use cases can be seen recently. One of the typical use-case is remote camera monitoring. With WebRTC, people can have interoperability and flexibility for deploying monitoring service. However, the benefit of WebRTC for IoT is not only its convenience and interopera...
Vulnerability management is vital for large companies that need to secure containers across thousands of hosts, but many struggle to understand how exposed they are when they discover a new high security vulnerability. In his session at 21st Cloud Expo, John Morello, CTO of Twistlock, will address this pressing concern by introducing the concept of the “Vulnerability Risk Tree API,” which brings all the data together in a simple REST endpoint, allowing companies to easily grasp the severity of t...
DevOps at Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 21st Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to w...
IT organizations are moving to the cloud in hopes to approve efficiency, increase agility and save money. Migrating workloads might seem like a simple task, but what many businesses don’t realize is that application migration criteria differs across organizations, making it difficult for architects to arrive at an accurate TCO number. In his session at 21st Cloud Expo, Joe Kinsella, CTO of CloudHealth Technologies, will offer a systematic approach to understanding the TCO of a cloud application...
For financial firms, the cloud is going to increasingly become a crucial part of dealing with customers over the next five years and beyond, particularly with the growing use and acceptance of virtual currencies. There are new data storage paradigms on the horizon that will deliver secure solutions for storing and moving sensitive financial data around the world without touching terrestrial networks. In his session at 20th Cloud Expo, Cliff Beek, President of Cloud Constellation Corporation, d...
Most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes a lot of work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reduction in cost ...
"With Digital Experience Monitoring what used to be a simple visit to a web page has exploded into app on phones, data from social media feeds, competitive benchmarking - these are all components that are only available because of some type of digital asset," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at DevOps Summit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Secure Channels, a cybersecurity firm, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Secure Channels, Inc. offers several products and solutions to its many clients, helping them protect critical data from being compromised and access to computer networks from the unauthorized. The company develops comprehensive data encryption security strategie...
Connecting to major cloud service providers is becoming central to doing business. But your cloud provider’s performance is only as good as your connectivity solution. Massive Networks will place you in the driver's seat by exposing how you can extend your LAN from any location to include any cloud platform through an advanced high-performance connection that is secure and dedicated to your business-critical data. In his session at 21st Cloud Expo, Paul Mako, CEO & CIO of Massive Networks, wil...
From 2013, NTT Communications has been providing cPaaS service, SkyWay. Its customer’s expectations for leveraging WebRTC technology are not only typical real-time communication use cases such as Web conference, remote education, but also IoT use cases such as remote camera monitoring, smart-glass, and robotic. Because of this, NTT Communications has numerous IoT business use-cases that its customers are developing on top of PaaS. WebRTC will lead IoT businesses to be more innovative and address...
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...