SHARE
Facebook X Pinterest WhatsApp

Dell Adds Support for Hardware Crypto Accelerator

Top Cyber Scams Expected for 2014 When it comes to security, encryption has never been more popular. In the wake of an increased number of major security breaches and the Edward Snowden scandal involving the National Security Agency (NSA), interest in all things related to encryption has never been higher. The challenge is that the […]

Written By
MV
Mike Vizard
Apr 16, 2014
Slide Show

Top Cyber Scams Expected for 2014

When it comes to security, encryption has never been more popular. In the wake of an increased number of major security breaches and the Edward Snowden scandal involving the National Security Agency (NSA), interest in all things related to encryption has never been higher. The challenge is that the performance of just about anything encrypted leaves much to be desired.

Dell this week moved to address that specific issue with the introduction of Dell Data Protection | Hardware Crypto Accelerator, which makes use of a Trusted Platform Module (TPM) co-processor on Dell systems to accelerate the processing of encrypted data at a relatively nominal extra cost.

Brent Hansen, director of client solutions software for Dell, says that while Dell will continue to offer both software-based encryption and self-encrypted drives (SEDs), there is no substitute for dedicated hardware when it comes to encryption performance.

While it’s not clear to what degree enhanced security is playing a role in the battle for PC market share, Dell is making a concerted effort to make client security a major issue when deciding which PC vendors an enterprise should go with.

By making hardware-based encryption more easily available at the time of PC purchase, Hansen says Dell is trying to take performance issues off the table as an inhibitor to encryption adoption in environments running Windows systems.

By and large, internal IT organizations have resisted encryption because of both performance issues and the simple fact that it can be hard to manage. But as IT security continues to become a front and center business issue, it won’t be too long before most systems are equipped with some form of encryption as the new standard for providing basic IT security.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.