News Feed Item

Dell Unveils New Endpoint Data Security and Management Portfolio for Greater IT Interoperability

New Portfolio Combines Dell Data Security Solutions, Mozy by Dell, RSA and VMware AirWatch

AUSTIN, Texas, Oct. 19, 2016 /PRNewswire/ -- DELL EMC WORLD --

News Summary:

Dell Endpoint Data Security and Management Portfolio provides:

  • Optimal combination of proven security capabilities from one vendor
  • Unlocks workforce speed and agility while increasing IT productivity
  • Encompasses data protection, identity assurance, threat detection and response, and unified endpoint management

Full Story:

Dell today unveiled its Endpoint Data Security and Management portfolio encompassing solutions from Dell, Mozy by Dell, RSA and VMware AirWatch. This portfolio offers leading cybersecurity and endpoint management solutions to deliver robust data protection while unlocking the speed, agility and innovation of today's mobile workforce. Arming organizations with the tools they need to protect data and proactively detect threats, while reducing the complexities and administrative burden of working with multiple vendors, the new portfolio allows employees to securely work when, where and with the tools they need, without compromising security controls and protections. The new portfolio consists of four main pillars: 

Data Protection

  • Dell Data Protection | Endpoint Security Suite Enterprise provides authentication, file-based data encryption and advanced threat prevention in a single solution to enable businesses to protect their data while proactively preventing external threats including advanced persistent threats and malware. 
  • MozyEnterprise and MozyPro provide secure, cloud data protection for laptops, desktops and small servers across a distributed enterprise or small to mid-size business for resilient and easy recovery from data loss incidents ranging from user error to ransomware and malware attacks. Employing robust encryption, Mozy allows small and large businesses alike to embrace the convenience and functionality of the cloud, without danger of compromising their data. In addition to file protection, Mozy also enables file sync across devices such as multiple laptops, desktops and smartphones.

Identity Assurance

  • RSA SecurID® Access provides strong, advanced authentication featuring context-based access control and single sign-on for secure, convenient access to web and SaaS applications, native mobile apps and traditional enterprise resources.

Threat Detection and Response

  • RSA NetWitness® Endpoint uses the latest in behavioral analytics and machine learning to help organizations rapidly detect and focus investigations to accelerate response and remediation to advanced persistent threats and malware that are missed by other platforms.

Unified Endpoint Management

  • VMware AirWatch Unified Endpoint Management provides comprehensive, over-the-air management across all platforms including full Windows lifecycle management from the cloud. This includes configuration management, software distribution management, operating system (OS) patch management, client health and security management. AirWatch Unified Endpoint Management enables IT to deploy security patches and OS updates faster, install software more reliably and consolidate operational processes across all devices – on or off the domain and across any network. Organizations deploying both Dell Data Protection and AirWatch can report compliance from the AirWatch admin console when Dell Data Protection is active and protecting a device.

With the rise of cyber-attacks and data breaches, and today's increasingly mobile workforce, securely managing data and endpoints without inhibiting employee productivity is a pain point for customers of all sizes. Compounding the problem, organizations have had to turn to a slew of vendors offering point solutions, and stitch together their own security infrastructure. Organizations want to simplify the process of purchasing and deploying protection and security solutions for desktops, laptops and mobile devices by working with a vendor that can provide more of what they need.

"With our Endpoint Data Security and Management Portfolio, we are solving real customer pain points when it comes to purchasing and deploying security solutions" said Jeff Clarke, vice chairman, Operations, and president, Client Solutions Group, Dell. "Customers have told us they want to consolidate vendors to ease the manageability burden while enhancing their security. That is what we are doing for them."

The Dell Endpoint Data Security and Management portfolio builds on an already extensive set of security solutions and capabilities across Dell Technologies ranging from additional endpoint and data security solutions to managed security services, threat intelligence, and risk and compliance. Cloud data protection with Dell EMC MozyEnterprise and Dell EMC MozyPro is now available through Dell's direct sales force and channel partners, with solutions from RSA and AirWatch coming in December. Now, organizations can be assured of interoperability of endpoint solutions across Dell Technologies with one point-of-contact for sales.

Supporting Quotes:

Matt Eastwood, SVP, Enterprise Infrastructure and Datacenter, IDC
"While security continues to be a top concern for enterprise IT, most organizations are focusing most of their efforts on perimeter security including firewalls and intrusion detection. However, as employee mobility has increased and the number of mobile devices in use has exploded, an increasing number of breaches are occurring at the device level. IDC believes that a unified policy-based approach to data and endpoint security which leverages comprehensive systems management capabilities for all connected devices is the best way to achieve security and compliance end-to-end."

Russ Stockdale, Vice President and General Manager, Data Protection Cloud, Core Technologies, Dell EMC
"Mozy by Dell is the world's most trusted cloud data protection provider, with over 100PB of data under our management. The inclusion of our service into the new Dell Endpoint Data Security and Management portfolio is a golden opportunity to bring our award-winning service to an even wider community as part of a joined-up family of solutions from across Dell Technologies that will deliver the ultimate in protection for endpoints, all from one vendor."

Grant Geyer, Senior Vice President, Products, RSA
"RSA delivers business-driven security so organizations of all sizes can take command of their evolving security posture in this uncertain, high-risk world. The inclusion of RSA NetWitness Endpoint and RSA SecurID Access into the Endpoint Data Security and Management portfolio ensures that Dell Technologies customers can benefit from RSA's superior capabilities in advanced threat detection and multi-factor authentication."

Blake Brannon, Vice President, Product Marketing, Mobile Products, End User Computing, VMware
"The Endpoint Data Security and Management portfolio from Dell offers customers a holistic solution to solve the Windows lifecycle management and security challenges facing IT administrators in today's mobile-cloud era. These solutions simplify management and security while providing a better user experience and increased user productivity; ensuring greater agility for a company's workforce."

About Dell

With award-winning desktops, laptops, 2-in-1s and thin clients, powerful workstations and rugged devices made for specialized environments, monitors, endpoint security solutions and services, Dell gives today's workforce what they need to securely connect, produce, and collaborate from anywhere at any time. Dell, a part of Dell Technologies, services customers from consumers to organizations of all sizes across 180 countries with the industry's most comprehensive and innovative end-user portfolio.

Dell EMC World

Join us Oct. 18-20 at Dell EMC World 2016, Dell Technologies' flagship event bringing together technology and business professionals to network, share ideas and help co-create a better future. Learn more at www.dellemcworld.com and follow #DellEMCWorld on Twitter. 

Copyright © 2016 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. 

To view the original version on PR Newswire, visit:http://www.prnewswire.com/news-releases/dell-unveils-new-endpoint-data-security-and-management-portfolio-for-greater-it-interoperability-300347454.html


More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and microservices. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your conta...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
DevOps theory promotes a culture of continuous improvement built on collaboration, empowerment, systems thinking, and feedback loops. But how do you collaborate effectively across the traditional silos? How can you make decisions without system-wide visibility? How can you see the whole system when it is spread across teams and locations? How do you close feedback loops across teams and activities delivering complex multi-tier, cloud, container, serverless, and/or API-based services?
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and ...
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his session at @DevOpsSummit 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will show how customers are able to achieve a level of transparency that enables everyon...
Today every business relies on software to drive the innovation necessary for a competitive edge in the Application Economy. This is why collaboration between development and operations, or DevOps, has become IT’s number one priority. Whether you are in Dev or Ops, understanding how to implement a DevOps strategy can deliver faster development cycles, improved software quality, reduced deployment times and overall better experiences for your customers.
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...