Dell EMC reveals new enterprise security portfolio
Endpoint Data Security and Management range combines EMC and Dell products
Dell EMC has today announced its new Endpoint Data Security and Management portfolio, which incorporates products from across the Dell and EMC ranges into a single line.
The portfolio has four main pillars: data protection, Identity assurance, threat detection and response, and unified endpoint management.
Data Protection has two subsections, Dell Data Protection | Endpoint Security Suite Enterprise and MozyEnterprise and MozyPro.
Dell Data Protection | Endpoint Security Suite Enterprise provides authentication, file-based data encryption and advanced threat protection, which the company said will allow businesses to cover both sides of the security coin - data protection and threat prevention.
MozyEnterprise and MozyPro, meanwhile, provides secure, cloud data protection for desktop PCs, laptops and small servers. It is targeted particularly at small to mid-sized businesses and distributed enterprises, providing, Dell EMC claimed, resilient and easy recovery from data loss, whether that be accidental deletion or a malware attack.
The Identity Assurance pillar consists primarily of RSA SecurID Access, the familiar key fob or software-based two-factor authentication that has been iconic of RSA for the past several years.
Threat Detection and Response, meanwhile, covers RSA NetWitness Endpoint, which uses behavioural analytics and machine learning for threat detection, which can in turn help focus investigation efforts where they are most needed.
Finally, Unified Endpoint Management covers VMware AirWatch, the longstanding product range that offers over-the-air management, including configuration management, software distribution and operating system patching, across all platforms.
"With our Endpoint Data Security and Management Portfolio, we are solving real customer pain points when it comes to purchasing and deploying cloud solutions," Jeff Clarke, president of client solutions group at Dell, said.
"Customers have told us they want to consolidate vendors to ease the manageability burden while enhancing their security. That's what we're doing for them," he concluded.
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now