Dell Strengthens Security Portfolio

Mike Vizard
Slide Show

Expectations vs. Reality: Five Ways to Improve Cybersecurity Awareness

At the Dell World 2015 conference today, Dell previewed an advanced persistent threat (APT) protection service that will be delivered through Dell SonicWALL firewalls, while also providing in 2016 the ability to manage Dell switches via the management console it provides IT organizations that deploy those firewalls.

In addition, Dell announced that version 8.1 of Dell One Identity Cloud Access Manager now supports multifactor authentication via integration with Dell Defender as a Service, a software-as-a-service (SaaS) offering, and that Dell SonicWALL Email Security now supports Cyren anti-virus software in addition to several other AV offerings from Dell and third-party partners.

Finally, Dell announced that it is making the encryption capabilities it has developed on both Windows servers as well as PC clients a part of an ongoing effort to make deploying encryption as frictionless as possible.

In general, Bill Evans, senior director of product marketing at Dell Software, says Dell is moving to make the Global Management System (GMS) that it provides to manage Dell SonicWALL firewalls the management plane through which a variety of security services, residing on premise and in the cloud, are delivered. The end result should not only be an ability to respond more quickly to APTs, but also a lower total cost for securing the enterprise overall, says Evans.

Security

In fact, Evans says that most IT organizations these days are not just looking to reduce the total cost of security, they want more context about the nature of the attacks that are being launched as it relates to their specific vulnerabilities. The problem is that most of the IT security budget today is consumed by implementing the technologies rather than actually responding to threats, notes Evans.

Obviously, security is a top of mind issue for most IT organizations right now. The real challenge is finding ways to attain the security without having to break the IT budget in the process.




Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.